Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,495,785 papers from all fields of science
Search
Sign In
Create Free Account
Cryptographic primitive
Known as:
Primitive
Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
Authentication
Baruch Awerbuch
Block cipher
Chaotic cryptology
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
Qianhong Wu
,
Bo Qin
,
Lei Zhang
,
J. Domingo-Ferrer
,
O. Farràs
,
Jesús A. Manjón
IEEE transactions on computers
2016
Corpus ID: 26264670
Broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but require a trusted party to…
Expand
2013
2013
Efficient ASIC Implementation and Analysis of Two EPC-C1G2 RFID Authentication Protocols
Honorio Martín
,
E. San Millán
,
Pedro Peris-López
,
Juan E. Tapiador
IEEE Sensors Journal
2013
Corpus ID: 22551646
The Internet of Things refers to the use of services provided by the networked objects (things) equipped with computational…
Expand
2011
2011
Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems
Süleyman Kardaş
,
Mete Akgün
,
M. Kiraz
,
Hüseyin Demirci
Workshop on Lightweight Security & Privacy…
2011
Corpus ID: 16065165
Radio Frequency Identification (RFID) is a technology increasingly used in many applications for object identification. Ownership…
Expand
2011
2011
Prototype of a secure wireless patient monitoring system for the medical community
Stefan Moller
2011
Corpus ID: 109596840
2010
2010
A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption
A. Yavuz
,
F. Alagoz
,
E. Anarim
2010
Corpus ID: 15240816
Mobile Ad-hoc NETworks (MANETs) are expected to play an important role in tactical military networks by providing…
Expand
2009
2009
GenLM: License Management for Grid and Cloud Computing Environments
M. Dalheimer
,
F. Pfreundt
9th IEEE/ACM International Symposium on Cluster…
2009
Corpus ID: 16813347
Software license management allows independent software vendors (ISVs) to control the access of their products. It is a…
Expand
Highly Cited
2008
Highly Cited
2008
The eSTREAM Portfolio
S. Babbage
,
C. Cannière
,
+7 authors
M. Robshaw
2008
Corpus ID: 16749549
The information in this document is provided as is, and no guarantee or warranty is given or implied that the information is fit…
Expand
2007
2007
Hashchip: A shared-resource multi-hash function processor architecture on FPGA
T. Ganesh
,
Michael T. Frederick
,
T. Sudarshan
,
Arun Kumar Somani
Integr.
2007
Corpus ID: 15788022
2006
2006
Refuting security proofs for tripartite key exchange with model checker in planning problem setting
Kim-Kwang Raymond Choo
19th IEEE Computer Security Foundations Workshop…
2006
Corpus ID: 2030544
We encode a simplified version of the Canetti and Krawczyk (2001) formalism using asynchronous product automata (APA). We then…
Expand
1996
1996
An authenticated camera
J. Kelsey
,
B. Schneier
,
Chris Hall
Proceedings 12th Annual Computer Security…
1996
Corpus ID: 12498775
We develop protocols for an authenticated camera that allows people to verify that a given digital image was taken by a specific…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE