Gotowa bibliografia na temat „Symmetric-key primitive”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Symmetric-key primitive”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Symmetric-key primitive"
Jang, Kyungbae, Yujin Oh, Hyunji Kim i Hwajeong Seo. "Quantum Implementation of AIM: Aiming for Low-Depth". Applied Sciences 14, nr 7 (27.03.2024): 2824. http://dx.doi.org/10.3390/app14072824.
Pełny tekst źródłaShaukat Jamal, Sajjad, Dawood Shah, Abdulaziz Deajim i Tariq Shah. "The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers". Security and Communication Networks 2020 (24.09.2020): 1–14. http://dx.doi.org/10.1155/2020/8883884.
Pełny tekst źródłaChalla, RatnaKumari, i VijayaKumari Gunta. "A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code". Baghdad Science Journal 18, nr 2(Suppl.) (20.06.2021): 0899. http://dx.doi.org/10.21123/bsj.2021.18.2(suppl.).0899.
Pełny tekst źródłaPartala, Juha. "Algebraic generalization of Diffie–Hellman key exchange". Journal of Mathematical Cryptology 12, nr 1 (1.03.2018): 1–21. http://dx.doi.org/10.1515/jmc-2017-0015.
Pełny tekst źródłaÁlvarez, Rafael, Alicia Andrade i Antonio Zamora. "Optimizing a Password Hashing Function with Hardware-Accelerated Symmetric Encryption". Symmetry 10, nr 12 (3.12.2018): 705. http://dx.doi.org/10.3390/sym10120705.
Pełny tekst źródłaAlzahrani, Bander A., Ahmed Barnawi i Shehzad Ashraf Chaudhry. "A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems". Security and Communication Networks 2021 (5.11.2021): 1–12. http://dx.doi.org/10.1155/2021/3437373.
Pełny tekst źródłaBulbul, Salim Sabah, Zaid Ameen Abduljabbar, Duaa Fadhel Najem, Vincent Omollo Nyangaresi, Junchao Ma i Abdulla J. Y. Aldarwish. "Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control". Journal of Sensor and Actuator Networks 13, nr 1 (2.02.2024): 12. http://dx.doi.org/10.3390/jsan13010012.
Pełny tekst źródłakumar, N. Shantha, i Dr Hareesh K. "A Primitive Proposal of an Algorithm for IP and Mac Based Data Aggregation and message authentication in Wireless Sensor Networks". International Journal of Soft Computing and Engineering 9, nr 4 (5.11.2019): 14–17. http://dx.doi.org/10.35940/ijsce.c3322.109119.
Pełny tekst źródłaLudyawati, Ludyawati, Muhammad Khudzaifah i Erna Herawati. "Penggabungan Metode Vigènere Cipher dan ElGamal Pada Pengamanan Pesan Rahasia". Jurnal Riset Mahasiswa Matematika 2, nr 6 (1.09.2023): 247–56. http://dx.doi.org/10.18860/jrmm.v2i6.22041.
Pełny tekst źródłaHuang, Jing Lian, Zhuo Wang i Mei Rong He. "Algebraic Immunity, Correlation Immunity and other Cryptographic Properties of Quadratic Rotation Symmetric Boolean Functions". Advanced Materials Research 989-994 (lipiec 2014): 2593–98. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2593.
Pełny tekst źródłaRozprawy doktorskie na temat "Symmetric-key primitive"
Coggia, Daniel. "Techniques de cryptanalyse dédiées au chiffrement à bas coût". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS217.
Pełny tekst źródłaThis thesis contributes to the cryptanalysis effort needed to trust symmetric-key primitives like block-ciphers or pseudorandom generators. In particular, it studies a family of distinguishers based on subspace trails against SPN ciphers. This thesis also provides methods for modeling frequent cryptanalysis problems into MILP (Mixed-Integer Linear Programming) problems to allow cryptographers to benefit from the existence of very efficient MILP solvers. Finally, it presents techniques to analyze algebraic properties of symmetric-key primitives which could be useful to mount cube attacks
Kircanski, Aleksandar. "Cryptanalysis of symmetric key primitives". Thesis, 2009. http://spectrum.library.concordia.ca/976777/1/MR63043.pdf.
Pełny tekst źródłaEsmaeili, Salehani Yaser. "Side Channel Attacks on Symmetric Key Primitives". Thesis, 2011. http://spectrum.library.concordia.ca/7765/1/EsmaeiliSalehani_MASc_F2011.pdf.
Pełny tekst źródłaZaverucha, Gregory. "Hash Families and Cover-Free Families with Cryptographic Applications". Thesis, 2010. http://hdl.handle.net/10012/5532.
Pełny tekst źródłaCzęści książek na temat "Symmetric-key primitive"
Zhang, Handong, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang i Guoxiao Liu. "Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives". W Information Security and Privacy, 375–98. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-22301-3_19.
Pełny tekst źródłaRamzan, Zulfikar, i Leonid Reyzin. "On the Round Security of Symmetric-Key Cryptographic Primitives". W Advances in Cryptology — CRYPTO 2000, 376–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44598-6_24.
Pełny tekst źródłaNikolić, Ivica. "How to Use Metaheuristics for Design of Symmetric-Key Primitives". W Advances in Cryptology – ASIACRYPT 2017, 369–91. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70700-6_13.
Pełny tekst źródłaBuser, Maxime, Joseph K. Liu, Ron Steinfeld i Amin Sakzad. "Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives". W Applied Cryptography and Network Security, 892–912. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09234-3_44.
Pełny tekst źródłaGhosal, Anit Kumar, Satrajit Ghosh i Dipanwita Roychowdhury. "Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State Model". W Provable and Practical Security, 273–81. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-20917-8_18.
Pełny tekst źródłaGrassi, Lorenzo, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum i Qingju Wang. "Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato". W Advances in Cryptology – CRYPTO 2023, 305–39. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38548-3_11.
Pełny tekst źródłaBangalore, Laasya, Rishabh Bhadauria, Carmit Hazay i Muthuramakrishnan Venkitasubramaniam. "On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives". W Theory of Cryptography, 417–46. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22318-1_15.
Pełny tekst źródłaDerler, David, Sebastian Ramacher i Daniel Slamanig. "Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives". W Post-Quantum Cryptography, 419–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-79063-3_20.
Pełny tekst źródłaNoordhof, Paul. "Causal Non-Symmetry". W A Variety of Causes, 344–81. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780199251469.003.0012.
Pełny tekst źródła"Practical Constructions of Symmetric-Key Primitives". W Introduction to Modern Cryptography, 213–60. Chapman and Hall/CRC, 2014. http://dx.doi.org/10.1201/b17668-11.
Pełny tekst źródłaStreszczenia konferencji na temat "Symmetric-key primitive"
Grassi, Lorenzo, Christian Rechberger, Dragos Rotaru, Peter Scholl i Nigel P. Smart. "MPC-Friendly Symmetric Key Primitives". W CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2976749.2978332.
Pełny tekst źródłaAnada, Hiroaki, Masayuki Fukumitsu i Shingo Hasegawa. "Accountable Ring Signatures from Symmetric-Key Primitives*". W 2023 Eleventh International Symposium on Computing and Networking (CANDAR). IEEE, 2023. http://dx.doi.org/10.1109/candar60563.2023.00018.
Pełny tekst źródłaChase, Melissa, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig i Greg Zaverucha. "Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives". W CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3133956.3133997.
Pełny tekst źródłaKara, Gizem, i Oguz Yayla. "Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf". W 2022 15th International Conference on Information Security and Cryptography (ISCTURKEY). IEEE, 2022. http://dx.doi.org/10.1109/iscturkey56345.2022.9931846.
Pełny tekst źródła