Skip to search formSkip to main contentSkip to account menu

Computational hardness assumption

Known as: Computational hardness assumptions, Computational security 
In cryptography, a major goal is to create cryptographic primitives with provable security. In some cases, cryptographic protocols are found to have… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
This present paper displays the sensitivity study of the hardness profile of flat cylinders heated by induction-heating process… 
2010
2010
Wireless key exchange on the physical layer is a key exchange protocol independent of computational assumptions. It relies only… 
2010
2010
Due to the rapid growth of e-commerce technology, secure auction protocols have attracted much attention among researchers. The… 
2009
2009
The principal objective of this study was to assess the quality characteristics of Topokki with different amounts of curry powder… 
2007
2007
Temporal Networks play an important role in solving planning problems and they are also used, though not as frequently, when… 
2006
2006
Multimedia security schemes often combine cryptographic schemes with information hiding techniques such as steganography or… 
1998
1998
The alloy system Au−Ag−Pd−Pt−Sn is described with the help of the thermodynamic software ‘Chemsage’ and a specially modelled… 
Review
1988
Review
1988
We are engaged in a program intended to establish relationships between the microscopic structure of highly cross-linked organic…