Skip to search formSkip to main contentSkip to account menu

Computational hardness assumption

Known as: Computational hardness assumptions, Computational security 
In cryptography, a major goal is to create cryptographic primitives with provable security. In some cases, cryptographic protocols are found to have… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Attribute-based encryption is drawing more attention with its inherent attractive properties which are potential to be widely… 
2013
2013
This present paper displays the sensitivity study of the hardness profile of flat cylinders heated by induction-heating process… 
2010
2010
Wireless key exchange on the physical layer is a key exchange protocol independent of computational assumptions. It relies only… 
2009
2009
The principal objective of this study was to assess the quality characteristics of Topokki with different amounts of curry powder… 
2007
2007
Temporal Networks play an important role in solving planning problems and they are also used, though not as frequently, when… 
2006
2006
Multimedia security schemes often combine cryptographic schemes with information hiding techniques such as steganography or… 
1998
1998
The alloy system Au−Ag−Pd−Pt−Sn is described with the help of the thermodynamic software ‘Chemsage’ and a specially modelled… 
Review
1988
Review
1988
We are engaged in a program intended to establish relationships between the microscopic structure of highly cross-linked organic…