Skip to search formSkip to main contentSkip to account menu

Computational hardness assumption

Known as: Computational hardness assumptions, Computational security 
In cryptography, a major goal is to create cryptographic primitives with provable security. In some cases, cryptographic protocols are found to have… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
This present paper displays the sensitivity study of the hardness profile of flat cylinders heated by induction-heating process… 
2010
2010
Wireless key exchange on the physical layer is a key exchange protocol independent of computational assumptions. It relies only… 
2010
2010
Due to the rapid growth of e-commerce technology, secure auction protocols have attracted much attention among researchers. The… 
2009
2009
The principal objective of this study was to assess the quality characteristics of Topokki with different amounts of curry powder… 
2008
2008
Context. By studying the optical brightness surface density of the globular cluster NGC 6388, it has been recently proposed that… 
2007
2007
Temporal Networks play an important role in solving planning problems and they are also used, though not as frequently, when… 
2006
2006
Multimedia security schemes often combine cryptographic schemes with information hiding techniques such as steganography or… 
Review
1988
Review
1988
We are engaged in a program intended to establish relationships between the microscopic structure of highly cross-linked organic…