Cryptographic primitive

Known as: Primitive 
Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
This article presents a full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is… (More)
  • table II
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applications… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Phelix is a high-speed stream cipher with a built-in MAC functionality. It is efficient in both hardware and software. On current… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We introduce a new type of cryptographic primitives which enforce high communication or storage complexity. To evaluate these… (More)
  • table 1
Is this relevant?
Highly Cited
2001
Highly Cited
2001
  • Jiri. Sobotik
  • 2001
This paper discusses some aspects of testing random and pseudorandom number generators. A Statistical Test Suite for Random and… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We describe the design of Yarrow, a family of cryptographic pseudo-random number generators (PRNG). We describe the concept of a… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Mobile code technology has become a driving force for recent advances in distributed systems. The concept of mobility of… (More)
Is this relevant?
1997
1997
In this paper we provide a new cryptographic primitive that generalizes several existing zero-knowledge proofs and show that if a… (More)
  • table I
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Modern cryptography has had considerable impact on the development of com putational learning theory Virtually every… (More)
Is this relevant?
Review
1990
Review
1990
This paper provides an overview of the LOKI2 encryption primitive which may be used to encrypt and decrypt a 64-bit block of data… (More)
  • table 1
  • table 3
Is this relevant?