Skip to search formSkip to main contentSkip to account menu

Cryptographic primitive

Known as: Primitive 
Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2020
Highly Cited
2020
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a… 
Highly Cited
2017
Highly Cited
2017
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can securely outsource a database to an… 
Review
2016
Review
2016
Cryptographic primitives are fundamental building blocks for designing security protocols to achieve confidentiality… 
Highly Cited
2015
Highly Cited
2015
This article presents a full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is… 
Review
2010
Review
2010
We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service… 
Highly Cited
2008
Highly Cited
2008
We present a simple and efficient compiler for transforming secure multi-party computation (MPC) protocols that enjoy security… 
Highly Cited
2003
Highly Cited
2003
This paper provides a comprehensive treatment of forwardsecurity in the context of shared-key based cryptographic primitives, as… 
Highly Cited
2003
Highly Cited
2003
We consider the problem of extending oblivious transfers: Given a small number of oblivious transfers “for free,” can one… 
Highly Cited
1994
Highly Cited
1994
We initiate the investigation of a new kind of efficiency for cryptographic transformations. The idea is that having once applied… 
Highly Cited
1993
Highly Cited
1993
Modern cryptography has had considerable impact on the development of computational learning theory. Virtually every…