نتایج جستجو برای: lightweight cryptographic primitives

تعداد نتایج: 49629  

Journal: :Quantum Information & Computation 2017
Thomas Santoli Christian Schaffner

We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon’s algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives. Specifically, these examples consist of a quantum distinguisher for the 3-round Feistel network and a forgery attack on CBC-MAC which forges a tag for a c...

2015
Michael Backes Birgit Pfitzmann

Information flow and non-interference are popular concepts for expressing confidentiality and integrity properties. We present the first general definition of probabilistic non-interference in reactive systems that includes a computational case. This case is essential to cope with real cryptography, since non-interference properties can usually only be guaranteed if the underlying cryptographic...

Journal: :Trans. Petri Nets and Other Models of Concurrency 2012
Suriadi Suriadi Chun Ouyang Ernest Foo

To provide privacy protection, cryptographic primitives are frequently applied to communication protocols in an open environment (e.g. the Internet). We call these protocols privacy enhancing protocols (PEPs) which constitute a class of cryptographic protocols. Proof of the security properties, in terms of the privacy compliance, of PEPs is desirable before they can be deployed. However, the tr...

Journal: :International Journal of Advanced Computer Science and Applications 2018

Journal: :Journal of Computer Security 1997
James W. Gray Kin Fai Epsilon Ip King-Shan Lui

We develop an approach to deriving concrete engineering advice for cryptographic protocols from provablesecurity-style proofs of security. The approach is illustrated with a simple, yet useful protocol. The proof is novel and is the first published proof that provides an exact relationship between a high-level protocol and multiple cryptographic primitives.

1999
Christophe Bidan Pierre Girard

Smart card based products are subject to the cryptographic export regulations. Unfortunately, these regulations are often taken into account too late, and it results in export restrictions. We claim that most of the times, these restrictions could be avoided by considering the cryptographic export matters at the earliest design stages. The aim of this paper is to provide a few principles to use...

2012
Jean-Philippe Aumasson Simon Knellwolf Willi Meier

Lightweight primitives are generally limited to 80or 128-bit security, because lightweight applications seldom need more than this. However, non-lightweight platforms like multimedia systems-on-chip would also greatly benefit from a smaller hardware footprint, as it reduces development and integration costs, and leaves more circuit area to another component, or to add another functionality. Suc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید