Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,554 papers from all fields of science
Search
Sign In
Create Free Account
Cryptographic primitive
Known as:
Primitive
Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
Authentication
Baruch Awerbuch
Block cipher
Chaotic cryptology
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Efficient ASIC Implementation and Analysis of Two EPC-C1G2 RFID Authentication Protocols
Honorio Martín
,
E. San Millán
,
Pedro Peris-López
,
Juan E. Tapiador
IEEE Sensors Journal
2013
Corpus ID: 22551646
The Internet of Things refers to the use of services provided by the networked objects (things) equipped with computational…
Expand
2012
2012
A biometric identity-based signcryption scheme
Fagen Li
,
M. Khan
Future generations computer systems
2012
Corpus ID: 1412460
2011
2011
Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems
Süleyman Kardaş
,
Mete Akgün
,
M. Kiraz
,
Hüseyin Demirci
Workshop on Lightweight Security & Privacy…
2011
Corpus ID: 16065165
Radio Frequency Identification (RFID) is a technology increasingly used in many applications for object identification. Ownership…
Expand
2011
2011
Prototype of a secure wireless patient monitoring system for the medical community
Stefan Moller
2011
Corpus ID: 109596840
2010
2010
A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption
A. Yavuz
,
F. Alagoz
,
E. Anarim
2010
Corpus ID: 15240816
Mobile Ad-hoc NETworks (MANETs) are expected to play an important role in tactical military networks by providing…
Expand
2010
2010
Certificateless generalized signcryption
Huifang Ji
,
Wenbao Han
,
Long Zhao
IACR Cryptology ePrint Archive
2010
Corpus ID: 17003834
2009
2009
GenLM: License Management for Grid and Cloud Computing Environments
M. Dalheimer
,
F. Pfreundt
9th IEEE/ACM International Symposium on Cluster…
2009
Corpus ID: 16813347
Software license management allows independent software vendors (ISVs) to control the access of their products. It is a…
Expand
Highly Cited
2008
Highly Cited
2008
The eSTREAM Portfolio
S. Babbage
,
C. Cannière
,
+7 authors
M. Robshaw
2008
Corpus ID: 16749549
The information in this document is provided as is, and no guarantee or warranty is given or implied that the information is fit…
Expand
2004
2004
Non-repudiation protocols for multiple entities
J. A. Onieva
,
Jianying Zhou
,
Javier López
Computer Communications
2004
Corpus ID: 11647123
1996
1996
An authenticated camera
J. Kelsey
,
B. Schneier
,
Chris Hall
Proceedings 12th Annual Computer Security…
1996
Corpus ID: 12498775
We develop protocols for an authenticated camera that allows people to verify that a given digital image was taken by a specific…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE