Academic literature on the topic 'Symmetric-key primitive'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Symmetric-key primitive.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Symmetric-key primitive"
Jang, Kyungbae, Yujin Oh, Hyunji Kim, and Hwajeong Seo. "Quantum Implementation of AIM: Aiming for Low-Depth." Applied Sciences 14, no. 7 (March 27, 2024): 2824. http://dx.doi.org/10.3390/app14072824.
Full textShaukat Jamal, Sajjad, Dawood Shah, Abdulaziz Deajim, and Tariq Shah. "The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers." Security and Communication Networks 2020 (September 24, 2020): 1–14. http://dx.doi.org/10.1155/2020/8883884.
Full textChalla, RatnaKumari, and VijayaKumari Gunta. "A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code." Baghdad Science Journal 18, no. 2(Suppl.) (June 20, 2021): 0899. http://dx.doi.org/10.21123/bsj.2021.18.2(suppl.).0899.
Full textPartala, Juha. "Algebraic generalization of Diffie–Hellman key exchange." Journal of Mathematical Cryptology 12, no. 1 (March 1, 2018): 1–21. http://dx.doi.org/10.1515/jmc-2017-0015.
Full textÁlvarez, Rafael, Alicia Andrade, and Antonio Zamora. "Optimizing a Password Hashing Function with Hardware-Accelerated Symmetric Encryption." Symmetry 10, no. 12 (December 3, 2018): 705. http://dx.doi.org/10.3390/sym10120705.
Full textAlzahrani, Bander A., Ahmed Barnawi, and Shehzad Ashraf Chaudhry. "A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems." Security and Communication Networks 2021 (November 5, 2021): 1–12. http://dx.doi.org/10.1155/2021/3437373.
Full textBulbul, Salim Sabah, Zaid Ameen Abduljabbar, Duaa Fadhel Najem, Vincent Omollo Nyangaresi, Junchao Ma, and Abdulla J. Y. Aldarwish. "Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control." Journal of Sensor and Actuator Networks 13, no. 1 (February 2, 2024): 12. http://dx.doi.org/10.3390/jsan13010012.
Full textkumar, N. Shantha, and Dr Hareesh K. "A Primitive Proposal of an Algorithm for IP and Mac Based Data Aggregation and message authentication in Wireless Sensor Networks." International Journal of Soft Computing and Engineering 9, no. 4 (November 5, 2019): 14–17. http://dx.doi.org/10.35940/ijsce.c3322.109119.
Full textLudyawati, Ludyawati, Muhammad Khudzaifah, and Erna Herawati. "Penggabungan Metode Vigènere Cipher dan ElGamal Pada Pengamanan Pesan Rahasia." Jurnal Riset Mahasiswa Matematika 2, no. 6 (September 1, 2023): 247–56. http://dx.doi.org/10.18860/jrmm.v2i6.22041.
Full textHuang, Jing Lian, Zhuo Wang, and Mei Rong He. "Algebraic Immunity, Correlation Immunity and other Cryptographic Properties of Quadratic Rotation Symmetric Boolean Functions." Advanced Materials Research 989-994 (July 2014): 2593–98. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2593.
Full textDissertations / Theses on the topic "Symmetric-key primitive"
Coggia, Daniel. "Techniques de cryptanalyse dédiées au chiffrement à bas coût." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS217.
Full textThis thesis contributes to the cryptanalysis effort needed to trust symmetric-key primitives like block-ciphers or pseudorandom generators. In particular, it studies a family of distinguishers based on subspace trails against SPN ciphers. This thesis also provides methods for modeling frequent cryptanalysis problems into MILP (Mixed-Integer Linear Programming) problems to allow cryptographers to benefit from the existence of very efficient MILP solvers. Finally, it presents techniques to analyze algebraic properties of symmetric-key primitives which could be useful to mount cube attacks
Kircanski, Aleksandar. "Cryptanalysis of symmetric key primitives." Thesis, 2009. http://spectrum.library.concordia.ca/976777/1/MR63043.pdf.
Full textEsmaeili, Salehani Yaser. "Side Channel Attacks on Symmetric Key Primitives." Thesis, 2011. http://spectrum.library.concordia.ca/7765/1/EsmaeiliSalehani_MASc_F2011.pdf.
Full textZaverucha, Gregory. "Hash Families and Cover-Free Families with Cryptographic Applications." Thesis, 2010. http://hdl.handle.net/10012/5532.
Full textBook chapters on the topic "Symmetric-key primitive"
Zhang, Handong, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, and Guoxiao Liu. "Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives." In Information Security and Privacy, 375–98. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-22301-3_19.
Full textRamzan, Zulfikar, and Leonid Reyzin. "On the Round Security of Symmetric-Key Cryptographic Primitives." In Advances in Cryptology — CRYPTO 2000, 376–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44598-6_24.
Full textNikolić, Ivica. "How to Use Metaheuristics for Design of Symmetric-Key Primitives." In Advances in Cryptology – ASIACRYPT 2017, 369–91. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70700-6_13.
Full textBuser, Maxime, Joseph K. Liu, Ron Steinfeld, and Amin Sakzad. "Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives." In Applied Cryptography and Network Security, 892–912. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09234-3_44.
Full textGhosal, Anit Kumar, Satrajit Ghosh, and Dipanwita Roychowdhury. "Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State Model." In Provable and Practical Security, 273–81. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-20917-8_18.
Full textGrassi, Lorenzo, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, and Qingju Wang. "Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato." In Advances in Cryptology – CRYPTO 2023, 305–39. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38548-3_11.
Full textBangalore, Laasya, Rishabh Bhadauria, Carmit Hazay, and Muthuramakrishnan Venkitasubramaniam. "On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives." In Theory of Cryptography, 417–46. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22318-1_15.
Full textDerler, David, Sebastian Ramacher, and Daniel Slamanig. "Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives." In Post-Quantum Cryptography, 419–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-79063-3_20.
Full textNoordhof, Paul. "Causal Non-Symmetry." In A Variety of Causes, 344–81. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780199251469.003.0012.
Full text"Practical Constructions of Symmetric-Key Primitives." In Introduction to Modern Cryptography, 213–60. Chapman and Hall/CRC, 2014. http://dx.doi.org/10.1201/b17668-11.
Full textConference papers on the topic "Symmetric-key primitive"
Grassi, Lorenzo, Christian Rechberger, Dragos Rotaru, Peter Scholl, and Nigel P. Smart. "MPC-Friendly Symmetric Key Primitives." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2976749.2978332.
Full textAnada, Hiroaki, Masayuki Fukumitsu, and Shingo Hasegawa. "Accountable Ring Signatures from Symmetric-Key Primitives*." In 2023 Eleventh International Symposium on Computing and Networking (CANDAR). IEEE, 2023. http://dx.doi.org/10.1109/candar60563.2023.00018.
Full textChase, Melissa, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, and Greg Zaverucha. "Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3133956.3133997.
Full textKara, Gizem, and Oguz Yayla. "Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf." In 2022 15th International Conference on Information Security and Cryptography (ISCTURKEY). IEEE, 2022. http://dx.doi.org/10.1109/iscturkey56345.2022.9931846.
Full text