Literatura académica sobre el tema "Symmetric-key primitive"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Symmetric-key primitive".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Symmetric-key primitive"
Jang, Kyungbae, Yujin Oh, Hyunji Kim y Hwajeong Seo. "Quantum Implementation of AIM: Aiming for Low-Depth". Applied Sciences 14, n.º 7 (27 de marzo de 2024): 2824. http://dx.doi.org/10.3390/app14072824.
Texto completoShaukat Jamal, Sajjad, Dawood Shah, Abdulaziz Deajim y Tariq Shah. "The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers". Security and Communication Networks 2020 (24 de septiembre de 2020): 1–14. http://dx.doi.org/10.1155/2020/8883884.
Texto completoChalla, RatnaKumari y VijayaKumari Gunta. "A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code". Baghdad Science Journal 18, n.º 2(Suppl.) (20 de junio de 2021): 0899. http://dx.doi.org/10.21123/bsj.2021.18.2(suppl.).0899.
Texto completoPartala, Juha. "Algebraic generalization of Diffie–Hellman key exchange". Journal of Mathematical Cryptology 12, n.º 1 (1 de marzo de 2018): 1–21. http://dx.doi.org/10.1515/jmc-2017-0015.
Texto completoÁlvarez, Rafael, Alicia Andrade y Antonio Zamora. "Optimizing a Password Hashing Function with Hardware-Accelerated Symmetric Encryption". Symmetry 10, n.º 12 (3 de diciembre de 2018): 705. http://dx.doi.org/10.3390/sym10120705.
Texto completoAlzahrani, Bander A., Ahmed Barnawi y Shehzad Ashraf Chaudhry. "A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems". Security and Communication Networks 2021 (5 de noviembre de 2021): 1–12. http://dx.doi.org/10.1155/2021/3437373.
Texto completoBulbul, Salim Sabah, Zaid Ameen Abduljabbar, Duaa Fadhel Najem, Vincent Omollo Nyangaresi, Junchao Ma y Abdulla J. Y. Aldarwish. "Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control". Journal of Sensor and Actuator Networks 13, n.º 1 (2 de febrero de 2024): 12. http://dx.doi.org/10.3390/jsan13010012.
Texto completokumar, N. Shantha y Dr Hareesh K. "A Primitive Proposal of an Algorithm for IP and Mac Based Data Aggregation and message authentication in Wireless Sensor Networks". International Journal of Soft Computing and Engineering 9, n.º 4 (5 de noviembre de 2019): 14–17. http://dx.doi.org/10.35940/ijsce.c3322.109119.
Texto completoLudyawati, Ludyawati, Muhammad Khudzaifah y Erna Herawati. "Penggabungan Metode Vigènere Cipher dan ElGamal Pada Pengamanan Pesan Rahasia". Jurnal Riset Mahasiswa Matematika 2, n.º 6 (1 de septiembre de 2023): 247–56. http://dx.doi.org/10.18860/jrmm.v2i6.22041.
Texto completoHuang, Jing Lian, Zhuo Wang y Mei Rong He. "Algebraic Immunity, Correlation Immunity and other Cryptographic Properties of Quadratic Rotation Symmetric Boolean Functions". Advanced Materials Research 989-994 (julio de 2014): 2593–98. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2593.
Texto completoTesis sobre el tema "Symmetric-key primitive"
Coggia, Daniel. "Techniques de cryptanalyse dédiées au chiffrement à bas coût". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS217.
Texto completoThis thesis contributes to the cryptanalysis effort needed to trust symmetric-key primitives like block-ciphers or pseudorandom generators. In particular, it studies a family of distinguishers based on subspace trails against SPN ciphers. This thesis also provides methods for modeling frequent cryptanalysis problems into MILP (Mixed-Integer Linear Programming) problems to allow cryptographers to benefit from the existence of very efficient MILP solvers. Finally, it presents techniques to analyze algebraic properties of symmetric-key primitives which could be useful to mount cube attacks
Kircanski, Aleksandar. "Cryptanalysis of symmetric key primitives". Thesis, 2009. http://spectrum.library.concordia.ca/976777/1/MR63043.pdf.
Texto completoEsmaeili, Salehani Yaser. "Side Channel Attacks on Symmetric Key Primitives". Thesis, 2011. http://spectrum.library.concordia.ca/7765/1/EsmaeiliSalehani_MASc_F2011.pdf.
Texto completoZaverucha, Gregory. "Hash Families and Cover-Free Families with Cryptographic Applications". Thesis, 2010. http://hdl.handle.net/10012/5532.
Texto completoCapítulos de libros sobre el tema "Symmetric-key primitive"
Zhang, Handong, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang y Guoxiao Liu. "Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives". En Information Security and Privacy, 375–98. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-22301-3_19.
Texto completoRamzan, Zulfikar y Leonid Reyzin. "On the Round Security of Symmetric-Key Cryptographic Primitives". En Advances in Cryptology — CRYPTO 2000, 376–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44598-6_24.
Texto completoNikolić, Ivica. "How to Use Metaheuristics for Design of Symmetric-Key Primitives". En Advances in Cryptology – ASIACRYPT 2017, 369–91. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70700-6_13.
Texto completoBuser, Maxime, Joseph K. Liu, Ron Steinfeld y Amin Sakzad. "Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives". En Applied Cryptography and Network Security, 892–912. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09234-3_44.
Texto completoGhosal, Anit Kumar, Satrajit Ghosh y Dipanwita Roychowdhury. "Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State Model". En Provable and Practical Security, 273–81. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-20917-8_18.
Texto completoGrassi, Lorenzo, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum y Qingju Wang. "Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato". En Advances in Cryptology – CRYPTO 2023, 305–39. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38548-3_11.
Texto completoBangalore, Laasya, Rishabh Bhadauria, Carmit Hazay y Muthuramakrishnan Venkitasubramaniam. "On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives". En Theory of Cryptography, 417–46. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22318-1_15.
Texto completoDerler, David, Sebastian Ramacher y Daniel Slamanig. "Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives". En Post-Quantum Cryptography, 419–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-79063-3_20.
Texto completoNoordhof, Paul. "Causal Non-Symmetry". En A Variety of Causes, 344–81. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780199251469.003.0012.
Texto completo"Practical Constructions of Symmetric-Key Primitives". En Introduction to Modern Cryptography, 213–60. Chapman and Hall/CRC, 2014. http://dx.doi.org/10.1201/b17668-11.
Texto completoActas de conferencias sobre el tema "Symmetric-key primitive"
Grassi, Lorenzo, Christian Rechberger, Dragos Rotaru, Peter Scholl y Nigel P. Smart. "MPC-Friendly Symmetric Key Primitives". En CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2976749.2978332.
Texto completoAnada, Hiroaki, Masayuki Fukumitsu y Shingo Hasegawa. "Accountable Ring Signatures from Symmetric-Key Primitives*". En 2023 Eleventh International Symposium on Computing and Networking (CANDAR). IEEE, 2023. http://dx.doi.org/10.1109/candar60563.2023.00018.
Texto completoChase, Melissa, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig y Greg Zaverucha. "Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives". En CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3133956.3133997.
Texto completoKara, Gizem y Oguz Yayla. "Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf". En 2022 15th International Conference on Information Security and Cryptography (ISCTURKEY). IEEE, 2022. http://dx.doi.org/10.1109/iscturkey56345.2022.9931846.
Texto completo