Skip to search formSkip to main contentSkip to account menu

Cryptographic primitive

Known as: Primitive 
Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but require a trusted party to… 
2013
2013
The Internet of Things refers to the use of services provided by the networked objects (things) equipped with computational… 
2011
2011
Radio Frequency Identification (RFID) is a technology increasingly used in many applications for object identification. Ownership… 
2010
2010
Mobile Ad-hoc NETworks (MANETs) are expected to play an important role in tactical military networks by providing… 
2009
2009
Software license management allows independent software vendors (ISVs) to  control the access of their products. It is a… 
Highly Cited
2008
Highly Cited
2008
The information in this document is provided as is, and no guarantee or warranty is given or implied that the information is fit… 
2006
2006
We encode a simplified version of the Canetti and Krawczyk (2001) formalism using asynchronous product automata (APA). We then… 
1996
1996
We develop protocols for an authenticated camera that allows people to verify that a given digital image was taken by a specific…