# Cryptographic primitive

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

2015

2015

- ACM Trans. Program. Lang. Syst.
- 2015

This article presents a full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This isâ€¦Â (More)

Is this relevant?

Highly Cited

2006

Highly Cited

2006

- IACR Cryptology ePrint Archive
- 2006

Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applicationsâ€¦Â (More)

Is this relevant?

Highly Cited

2003

Highly Cited

2003

- FSE
- 2003

Phelix is a high-speed stream cipher with a built-in MAC functionality. It is efficient in both hardware and software. On currentâ€¦Â (More)

Is this relevant?

Highly Cited

2002

Highly Cited

2002

- Financial Cryptography
- 2002

We introduce a new type of cryptographic primitives which enforce high communication or storage complexity. To evaluate theseâ€¦Â (More)

Is this relevant?

Highly Cited

2001

Highly Cited

2001

A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application

- 2001

This paper discusses some aspects of testing random and pseudorandom number generators. A Statistical Test Suite for Random andâ€¦Â (More)

Is this relevant?

Highly Cited

1999

Highly Cited

1999

- Selected Areas in Cryptography
- 1999

We describe the design of Yarrow, a family of cryptographic pseudo-random number generators (PRNG). We describe the concept of aâ€¦Â (More)

Is this relevant?

Highly Cited

1998

Highly Cited

1998

- IEEE Symposium on Security and Privacy
- 1998

Mobile code technology has become a driving force for recent advances in distributed systems. The concept of mobility ofâ€¦Â (More)

Is this relevant?

1997

1997

- Journal of Cryptology
- 1997

In this paper we provide a new cryptographic primitive that generalizes several existing zero-knowledge proofs and show that if aâ€¦Â (More)

Is this relevant?

Highly Cited

1993

Highly Cited

1993

- CRYPTO
- 1993

Modern cryptography has had considerable impact on the development of com putational learning theory Virtually everyâ€¦Â (More)

Is this relevant?

Review

1990

Review

1990

- AUSCRYPT
- 1990

This paper provides an overview of the LOKI2 encryption primitive which may be used to encrypt and decrypt a 64-bit block of dataâ€¦Â (More)

Is this relevant?