نتایج جستجو برای: lightweight cryptographic primitives

تعداد نتایج: 49629  

1993
Avrim Blum Merrick L. Furst Michael Kearns Richard J. Lipton

Modern cryptography has had considerable impact on the development of computational learning theory. Tools from cryptography have been used in proving nearly all of the strong negative results for learning. In this paper, we give results in the reverse direction by showing how to construct several cryptographic primitives based on certain assumptions on the di culty of learning. Thus we develop...

Journal: :IACR Cryptology ePrint Archive 2005
M. Choudary Gorantla Raju Gangishetti Ashutosh Saxena

ID-based cryptosystem has been, for a few years, the most active area of research and currently is of great interest to the cryptographic society. In this work we survey three fundamental ID-based cryptographic primitives Digital Signature, Encryption and Key Agreement, which are based on the mathematical concepts Integer Factorization, Quadratic Residues and Bilinear Pairings. We review severa...

Journal: :SIAM J. Comput. 2005
Rosario Gennaro Yael Gertner Jonathan Katz Luca Trevisan

A central focus of modern cryptography is the construction of efficient, “high-level” cryptographic tools (e.g., encryption schemes) from weaker, “low-level” cryptographic primitives (e.g., one-way functions). Of interest are both the existence of such constructions, and their efficiency. Here, we show essentially-tight lower bounds on the best possible efficiency of any black-box construction ...

Journal: :International Journal of Advanced Trends in Computer Science and Engineering 2020

Journal: :IOSR Journal of Electronics and Communication Engineering 2017

Journal: :Future Internet 2023

Highly constrained devices that are interconnected and interact to complete a task being used in diverse range of new fields. The Internet Things (IoT), cyber-physical systems, distributed control vehicular wireless sensor networks, tele-medicine, the smart grid few examples these In any contexts, security privacy might be essential aspects. Research on secure communication (IoT) networks is hi...

2004
Ross J. Anderson

This note presents a new way of composing cryptographic primitives which makes some novel combinations possible. For example, one can do threshold decryption using standard block ciphers, or using an arbitrary mix of different decryption algorithms – such as any three keys out of two AES keys, a 3DES key, an RSA key and a one-time pad. We also provide a new way to combine different types of pri...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید