• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,477
Next 10 →

Universal One-Way Hash Functions and their Cryptographic Applications

by Moni Naor, Moti Yung , 1989
"... We define a Universal One-Way Hash Function family, a new primitive which enables the compression of elements in the function domain. The main property of this primitive is that given an element x in the domain, it is computationally hard to find a different domain element which collides with x. We ..."
Abstract - Cited by 351 (15 self) - Add to MetaCart
prove constructively that universal one-way hash functions exist if any 1-1 one-way functions exist. Among the various applications of the primitive is a One-Way based Secure Digital Signature Scheme which is existentially secure against adoptive attacks. Previously, all provably secure signature

Smooth orders and cryptographic applications

by Carl Pomerance, Igor E. Shparlinski - Lect. Notes in Comp. Sci
"... Abstract. We obtain rigorous upper bounds on the number of primes p ≤ x for which p−1 is smooth or has a large smooth factor. Conjecturally these bounds are nearly tight. As a corollary, we show that for almost all primes p the multiplicative order of 2 modulo p is not smooth, and we prove a similar ..."
Abstract - Cited by 7 (2 self) - Add to MetaCart
similar but weaker result for almost all odd numbers n. We also discuss some cryptographic applications. 1

Cryptographic Application Scenarios

by Vangelis Karatsiolis, Lucie Langer, Axel Schmidt, Erik Tews, Technische Universität Darmstadt
"... Abstract. The applications that use cryptography as well as the employed devices pose various requirements and constraints. These have to be considered during the development or analysis of cryptographic algorithms that are secure and practicable. This paper presents several real-world cryptographic ..."
Abstract - Add to MetaCart
Abstract. The applications that use cryptography as well as the employed devices pose various requirements and constraints. These have to be considered during the development or analysis of cryptographic algorithms that are secure and practicable. This paper presents several real

Divisibility, Smoothness and Cryptographic Applications

by David Naccache, Igor E. Shparlinski , 2008
"... This paper deals with products of moderate-size primes, familiarly known as smooth numbers. Smooth numbers play an crucial role in information theory, signal processing and cryptography. We present various properties of smooth numbers relating to their enumeration, distribution and occurrence in var ..."
Abstract - Add to MetaCart
in various integer sequences. We then turn our attention to cryptographic applications in which smooth numbers play a pivotal role.

How Secure Are FPGAs in Cryptographic Applications?

by Thomas Wollinger, Christof Paar - Proceedings of International Conference on Field Programmable Logic and Applications (FPL 2003), Lecture Notes in Computer Science Volume 2778 , 2003
"... The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of rec ..."
Abstract - Cited by 20 (1 self) - Add to MetaCart
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages

Neural Networks and their Cryptographic Applications

by David Pointcheval , 1994
"... Identification is a useful cryptographic tool. Since the zero-knowledge theory appeared [3], several interactive identification schemes have been proposed (in particular Fiat-Shamir [2] and its variants [4, 6, 5], Schnorr [8]). These identifications are based on number theoretical problems. More re ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Identification is a useful cryptographic tool. Since the zero-knowledge theory appeared [3], several interactive identification schemes have been proposed (in particular Fiat-Shamir [2] and its variants [4, 6, 5], Schnorr [8]). These identifications are based on number theoretical problems. More

CRYPTOGRAPHIC APPLICATIONS OF NONABELIAN GROUPS

by Christopher Bates, Nicolas Meyer, Thomas Pulickal
"... Abstract. Since the development of the RSA cryptographic system by Rivest, Shamir, and Adleman, in 1977, RSA has become a cornerstone of communica-tion security. However, as computers gain in processing speed, it is imperative that stronger cryptographic schemes be implemented in order to withstand ..."
Abstract - Add to MetaCart
Abstract. Since the development of the RSA cryptographic system by Rivest, Shamir, and Adleman, in 1977, RSA has become a cornerstone of communica-tion security. However, as computers gain in processing speed, it is imperative that stronger cryptographic schemes be implemented in order to withstand

On the inadequacy of the logistic map for cryptographic applications

by Actas De La X Recsi, David Arroyo, Gonzalo Alvarez, Veronica Fern , 805
"... Abstract — This paper analyzes the use of the logistic map for cryptographic applications. The most important characteristics of the logistic map are shown in order to prove the inconvenience of considering this map in the design of new chaotic cryptosystems. I. ..."
Abstract - Add to MetaCart
Abstract — This paper analyzes the use of the logistic map for cryptographic applications. The most important characteristics of the logistic map are shown in order to prove the inconvenience of considering this map in the design of new chaotic cryptosystems. I.

“METAPROOFS” (and their Cryptographic Applications)

by Alfredo De Santis, Moti Yung , 1990
"... We develop a non-interactive proof-system which we call “Metaproof ” (µ-NIZK proof system); it provides a proof of “the existence of a proof to a statement”. This metamathematical notion indeed seems redundant when we deal with proving N P statements, but in the context of zero-knowledge theory and ..."
Abstract - Add to MetaCart
and cryptography it has a large variety of applications. Combined with another tool we develop which we call “on-line simulatable NIZK proofsystem”, it is the key tool used to solve the open problem of the existence of a many prover non-interactive zero-knowledge system (MP-NIZK proof system). This problem

GENERATING QUASIGROUPS FOR CRYPTOGRAPHIC APPLICATIONS

by Czesław Ko ´scielny
"... A method of generating a practically unlimited number of quasigroups of a (theoretically) arbitrary order using the computer algebra system Maple 7 is presented. This problem is crucial to cryptography and its solution permits to implement practical quasigroup-based endomorphic cryptosystems. The or ..."
Abstract - Add to MetaCart
A method of generating a practically unlimited number of quasigroups of a (theoretically) arbitrary order using the computer algebra system Maple 7 is presented. This problem is crucial to cryptography and its solution permits to implement practical quasigroup-based endomorphic cryptosystems. The order of a quasigroup usually equals the number of characters of the alphabet used for recording both the plaintext and the ciphertext. From the practical viewpoint, the most important quasigroups are of order 256, suitable for a fast software encryption of messages written down in the universal ASCII code. That is exactly what this paper provides: fast and easy ways of generating quasigroups of order up to 256 and a little more.
Next 10 →
Results 1 - 10 of 3,477
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University