Results 81 to 90 of about 1,355 (213)
On Bitcoin Security in the Presence of Broken Cryptographic Primitives [PDF]
Digital currencies like Bitcoin rely on cryptographic primitives to operate. However, past experience shows that cryptographic primitives do not last forever: increased computational power and advanced cryptanalysis cause primitives to break frequently, and motivate the development of new ones.
Giechaskiel, I, Cremers, C, Rasmussen, K
openaire +1 more source
Cryptanalysis of Selected ARX-Based Block Ciphers
The security of digital communication and information systems is mostly dependent on block ciphers. ARX-based ciphers are widely used due to their simplicity and efficiency.
Praveen Kumar Gundaram
doaj +1 more source
The least primitive roots mod p
Let p>1p\gt 1 be a large prime number, and let ε>0\varepsilon \gt 0 be a small number. The established unconditional upper bounds of the least primitive root u≠±1,v2u\ne \pm 1,{v}^{2} in the prime finite field Fp{{\mathbb{F}}}_{p} have exponential ...
Carella Nelson
doaj +1 more source
On the Bit Security of Cryptographic Primitives
We introduce a formal quantitative notion of “bit security” for a general type of cryptographic games (capturing both decision and search problems), aimed at capturing the intuition that a cryptographic primitive with k-bit security is as hard to break as an ideal cryptographic function requiring a brute force attack on a k-bit key space.
Micciancio, Daniele, Walter, Michael
openaire +1 more source
Privacy-Oriented Cryptographic Primitives and Protocols for Electronic Voting
Panagiotis Grontas +1 more
openalex +1 more source
FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices
Mo Zhang +3 more
openalex +2 more sources
A Universally Composable Linkable Ring Signature Supporting Stealth Addresses
The linkable ring signature supporting stealth addresses (SALRS) is a recently proposed cryptographic primitive, which is designed to comprehensively address the soundness and privacy requirements associated with concealing the identities of both the ...
Xingkai Wang, Chunping Zhu, Zhen Liu
doaj +1 more source
The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives [PDF]
Yan-Cheng Chang +2 more
openalex +1 more source
High performance VLSI architectures implementing strong cryptographic primitives [PDF]
F. Allah Cherigui
openalex +1 more source

