Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Cryptographic primitive 8 found (614 total)

alternate case: cryptographic primitive

Yuliang Zheng (80 words) [view diff] exact match in snippet view article find links to article

at Birmingham. He is best known for inventing the Signcryption cryptographic primitive that combines the digital signature and encryption operations into
Trace zero cryptography (1,488 words) [view diff] exact match in snippet view article find links to article
asymmetric cryptography using the discrete logarithm problem as cryptographic primitive. Trace zero varieties feature a better scalar multiplication performance
EnRUPT (119 words) [view diff] exact match in snippet view article find links to article
round. Sean O'Neil (2008). "EnRUPT: First all-in-one symmetric cryptographic primitive" (ZIP). Workshop Record. SASC 2008 workshop. Khovratovich, Dmitry;
Digital credential (2,457 words) [view diff] exact match in snippet view article find links to article
this field by introducing blind signature protocols as a novel cryptographic primitive. In such protocols, the signer remains oblivious to the message
Obfuscation (software) (1,522 words) [view diff] exact match in snippet view article
in the many proposals for indistinguishability obfuscation, a cryptographic primitive that, if possible to build securely, would allow one to construct
White-box cryptography (2,456 words) [view diff] exact match in snippet view article find links to article
black-box model only provides an oracle access to the analyzed cryptographic primitive (in the form of encryption and/or decryption queries). There is
Noisy-storage model (2,870 words) [view diff] exact match in snippet view article find links to article
implemented securely, a common approach is to show that a simple cryptographic primitive can be implemented that is known to be universal for secure function
Ahto Buldas (413 words) [view diff] exact match in snippet view article find links to article
hash-function based cryptography. By using hash-functions as the only cryptographic primitive the complexities of key management are eliminated and the system