Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,275,348 papers from all fields of science
Search
Sign In
Create Free Account
Cryptographic primitive
Known as:
Primitive
Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
Authentication
Baruch Awerbuch
Block cipher
Chaotic cryptology
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2020
Highly Cited
2020
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
A. Aly
,
T. Ashur
,
Eli Ben-Sasson
,
S. Dhooghe
,
Alan Szepieniec
IACR Transactions on Symmetric Cryptology
2020
Corpus ID: 174775184
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a…
Expand
Highly Cited
2017
Highly Cited
2017
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
Raphael Bost
,
Brice Minaud
,
O. Ohrimenko
Conference on Computer and Communications…
2017
Corpus ID: 3982729
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can securely outsource a database to an…
Expand
Review
2016
Review
2016
A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks
Kyung-Ah Shim
IEEE Communications Surveys and Tutorials
2016
Corpus ID: 12001391
Cryptographic primitives are fundamental building blocks for designing security protocols to achieve confidentiality…
Expand
Highly Cited
2015
Highly Cited
2015
Verification of a Cryptographic Primitive: SHA-256
A. Appel
TOPL
2015
Corpus ID: 12568862
This article presents a full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is…
Expand
Review
2010
Review
2010
Cryptographic Cloud Storage
S. Kamara
,
K. Lauter
Financial Cryptography Workshops
2010
Corpus ID: 11635787
We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service…
Expand
Highly Cited
2008
Highly Cited
2008
Founding Cryptography on Oblivious Transfer - Efficiently
Yuval Ishai
,
M. Prabhakaran
,
A. Sahai
Annual International Cryptology Conference
2008
Corpus ID: 14503255
We present a simple and efficient compiler for transforming secure multi-party computation (MPC) protocols that enjoy security…
Expand
Highly Cited
2003
Highly Cited
2003
Forward-Security in Private-Key Cryptography
M. Bellare
,
Bennet S. Yee
The Cryptographer's Track at RSA Conference
2003
Corpus ID: 9213665
This paper provides a comprehensive treatment of forwardsecurity in the context of shared-key based cryptographic primitives, as…
Expand
Highly Cited
2003
Highly Cited
2003
Extending Oblivious Transfers Efficiently
Yuval Ishai
,
J. Kilian
,
Kobbi Nissim
,
E. Petrank
Annual International Cryptology Conference
2003
Corpus ID: 14292266
We consider the problem of extending oblivious transfers: Given a small number of oblivious transfers “for free,” can one…
Expand
Highly Cited
1994
Highly Cited
1994
Incremental Cryptography: The Case of Hashing and Signing
M. Bellare
,
Oded Goldreich
,
S. Goldwasser
Annual International Cryptology Conference
1994
Corpus ID: 152162
We initiate the investigation of a new kind of efficiency for cryptographic transformations. The idea is that having once applied…
Expand
Highly Cited
1993
Highly Cited
1993
Cryptographic Primitives Based on Hard Learning Problems
Avrim Blum
,
M. Furst
,
M. Kearns
,
R. Lipton
Annual International Cryptology Conference
1993
Corpus ID: 3900662
Modern cryptography has had considerable impact on the development of computational learning theory. Virtually every…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required