Literatura científica selecionada sobre o tema "Symmetric-key primitive"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Symmetric-key primitive".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Symmetric-key primitive"
Jang, Kyungbae, Yujin Oh, Hyunji Kim e Hwajeong Seo. "Quantum Implementation of AIM: Aiming for Low-Depth". Applied Sciences 14, n.º 7 (27 de março de 2024): 2824. http://dx.doi.org/10.3390/app14072824.
Texto completo da fonteShaukat Jamal, Sajjad, Dawood Shah, Abdulaziz Deajim e Tariq Shah. "The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers". Security and Communication Networks 2020 (24 de setembro de 2020): 1–14. http://dx.doi.org/10.1155/2020/8883884.
Texto completo da fonteChalla, RatnaKumari, e VijayaKumari Gunta. "A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code". Baghdad Science Journal 18, n.º 2(Suppl.) (20 de junho de 2021): 0899. http://dx.doi.org/10.21123/bsj.2021.18.2(suppl.).0899.
Texto completo da fontePartala, Juha. "Algebraic generalization of Diffie–Hellman key exchange". Journal of Mathematical Cryptology 12, n.º 1 (1 de março de 2018): 1–21. http://dx.doi.org/10.1515/jmc-2017-0015.
Texto completo da fonteÁlvarez, Rafael, Alicia Andrade e Antonio Zamora. "Optimizing a Password Hashing Function with Hardware-Accelerated Symmetric Encryption". Symmetry 10, n.º 12 (3 de dezembro de 2018): 705. http://dx.doi.org/10.3390/sym10120705.
Texto completo da fonteAlzahrani, Bander A., Ahmed Barnawi e Shehzad Ashraf Chaudhry. "A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems". Security and Communication Networks 2021 (5 de novembro de 2021): 1–12. http://dx.doi.org/10.1155/2021/3437373.
Texto completo da fonteBulbul, Salim Sabah, Zaid Ameen Abduljabbar, Duaa Fadhel Najem, Vincent Omollo Nyangaresi, Junchao Ma e Abdulla J. Y. Aldarwish. "Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control". Journal of Sensor and Actuator Networks 13, n.º 1 (2 de fevereiro de 2024): 12. http://dx.doi.org/10.3390/jsan13010012.
Texto completo da fontekumar, N. Shantha, e Dr Hareesh K. "A Primitive Proposal of an Algorithm for IP and Mac Based Data Aggregation and message authentication in Wireless Sensor Networks". International Journal of Soft Computing and Engineering 9, n.º 4 (5 de novembro de 2019): 14–17. http://dx.doi.org/10.35940/ijsce.c3322.109119.
Texto completo da fonteLudyawati, Ludyawati, Muhammad Khudzaifah e Erna Herawati. "Penggabungan Metode Vigènere Cipher dan ElGamal Pada Pengamanan Pesan Rahasia". Jurnal Riset Mahasiswa Matematika 2, n.º 6 (1 de setembro de 2023): 247–56. http://dx.doi.org/10.18860/jrmm.v2i6.22041.
Texto completo da fonteHuang, Jing Lian, Zhuo Wang e Mei Rong He. "Algebraic Immunity, Correlation Immunity and other Cryptographic Properties of Quadratic Rotation Symmetric Boolean Functions". Advanced Materials Research 989-994 (julho de 2014): 2593–98. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2593.
Texto completo da fonteTeses / dissertações sobre o assunto "Symmetric-key primitive"
Coggia, Daniel. "Techniques de cryptanalyse dédiées au chiffrement à bas coût". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS217.
Texto completo da fonteThis thesis contributes to the cryptanalysis effort needed to trust symmetric-key primitives like block-ciphers or pseudorandom generators. In particular, it studies a family of distinguishers based on subspace trails against SPN ciphers. This thesis also provides methods for modeling frequent cryptanalysis problems into MILP (Mixed-Integer Linear Programming) problems to allow cryptographers to benefit from the existence of very efficient MILP solvers. Finally, it presents techniques to analyze algebraic properties of symmetric-key primitives which could be useful to mount cube attacks
Kircanski, Aleksandar. "Cryptanalysis of symmetric key primitives". Thesis, 2009. http://spectrum.library.concordia.ca/976777/1/MR63043.pdf.
Texto completo da fonteEsmaeili, Salehani Yaser. "Side Channel Attacks on Symmetric Key Primitives". Thesis, 2011. http://spectrum.library.concordia.ca/7765/1/EsmaeiliSalehani_MASc_F2011.pdf.
Texto completo da fonteZaverucha, Gregory. "Hash Families and Cover-Free Families with Cryptographic Applications". Thesis, 2010. http://hdl.handle.net/10012/5532.
Texto completo da fonteCapítulos de livros sobre o assunto "Symmetric-key primitive"
Zhang, Handong, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang e Guoxiao Liu. "Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives". In Information Security and Privacy, 375–98. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-22301-3_19.
Texto completo da fonteRamzan, Zulfikar, e Leonid Reyzin. "On the Round Security of Symmetric-Key Cryptographic Primitives". In Advances in Cryptology — CRYPTO 2000, 376–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44598-6_24.
Texto completo da fonteNikolić, Ivica. "How to Use Metaheuristics for Design of Symmetric-Key Primitives". In Advances in Cryptology – ASIACRYPT 2017, 369–91. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70700-6_13.
Texto completo da fonteBuser, Maxime, Joseph K. Liu, Ron Steinfeld e Amin Sakzad. "Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives". In Applied Cryptography and Network Security, 892–912. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09234-3_44.
Texto completo da fonteGhosal, Anit Kumar, Satrajit Ghosh e Dipanwita Roychowdhury. "Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State Model". In Provable and Practical Security, 273–81. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-20917-8_18.
Texto completo da fonteGrassi, Lorenzo, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum e Qingju Wang. "Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato". In Advances in Cryptology – CRYPTO 2023, 305–39. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38548-3_11.
Texto completo da fonteBangalore, Laasya, Rishabh Bhadauria, Carmit Hazay e Muthuramakrishnan Venkitasubramaniam. "On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives". In Theory of Cryptography, 417–46. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22318-1_15.
Texto completo da fonteDerler, David, Sebastian Ramacher e Daniel Slamanig. "Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives". In Post-Quantum Cryptography, 419–40. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-79063-3_20.
Texto completo da fonteNoordhof, Paul. "Causal Non-Symmetry". In A Variety of Causes, 344–81. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780199251469.003.0012.
Texto completo da fonte"Practical Constructions of Symmetric-Key Primitives". In Introduction to Modern Cryptography, 213–60. Chapman and Hall/CRC, 2014. http://dx.doi.org/10.1201/b17668-11.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Symmetric-key primitive"
Grassi, Lorenzo, Christian Rechberger, Dragos Rotaru, Peter Scholl e Nigel P. Smart. "MPC-Friendly Symmetric Key Primitives". In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2976749.2978332.
Texto completo da fonteAnada, Hiroaki, Masayuki Fukumitsu e Shingo Hasegawa. "Accountable Ring Signatures from Symmetric-Key Primitives*". In 2023 Eleventh International Symposium on Computing and Networking (CANDAR). IEEE, 2023. http://dx.doi.org/10.1109/candar60563.2023.00018.
Texto completo da fonteChase, Melissa, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig e Greg Zaverucha. "Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives". In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3133956.3133997.
Texto completo da fonteKara, Gizem, e Oguz Yayla. "Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf". In 2022 15th International Conference on Information Security and Cryptography (ISCTURKEY). IEEE, 2022. http://dx.doi.org/10.1109/iscturkey56345.2022.9931846.
Texto completo da fonte