Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,217,199 papers from all fields of science
Search
Sign In
Create Free Account
ZK-Crypt
In cryptography, ZK-Crypt is a stream cipher developed by Carmi Gressel, Ran Granot, and Gabi Vago and has been patented. It has been submitted to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Cryptography
ECRYPT
ESTREAM
Stream cipher
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
On QA-NIZK in the BPK Model
B. Abdolmaleki
,
H. Lipmaa
,
Janno Siim
,
M. Zajac
IACR Cryptology ePrint Archive
2020
Corpus ID: 52977587
Recently, Bellare et al. defined subversion-resistance (security in the case the CRS creator may be malicious) for NIZK. In…
Expand
Highly Cited
2018
Highly Cited
2018
Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure
Ming Li
,
Yuzhu Guo
,
Jie Huang
,
Y. Li
Signal processing. Image communication
2018
Corpus ID: 3888130
2013
2013
Marginal fluctuations as instantons on M2/D2-branes
M. Naghdi
2013
Corpus ID: 53324569
We introduce some (anti-) M/D-branes through turning on the corresponding field strengths of the 11- and 10-dimensional…
Expand
2013
2013
New Instantons in AdS 4 /CFT 3 from D4-Branes Wrapping Some of CP 3
M. Naghdi
2013
Corpus ID: 119232179
With use of a 6-form field strength of ten-dimensional type IIA supergravity over AdS4× CP 3 , when S 7 /Zk is considered as a S…
Expand
Highly Cited
2009
Highly Cited
2009
AdS4/CFT3 duals from M2-branes at hypersurface singularities and their deformations
D. Martelli
,
J. Sparks
2009
Corpus ID: 18360094
We construct three-dimensional N=2 Chern-Simons-quiver theories which are holographically dual to the M-theory Freund-Rubin…
Expand
2008
2008
From global to local convergence of interior methods for nonlinear optimization
P. Armand
,
J. Benoist
,
D. Orban
Optim. Methods Softw.
2008
Corpus ID: 18013289
In this paper, we propose a modified primal–dual interior-point method for nonlinear programming that relaxes the requirement of…
Expand
Highly Cited
2007
Highly Cited
2007
NON-MATCHING MORTAR DISCRETIZATION ANALYSIS FOR THE COUPLING STOKES-DARCY EQUATIONS
J. Galvis
,
M. Sarkis
2007
Corpus ID: 17544369
We consider the coupling across an interface of uid and porous media o ws with Beavers-Joseph- Saffman transmission conditions…
Expand
2005
2005
The distinguishing attack on ZK-Crypt cipher ∗
A. Lubkin
,
B. Ryabko
2005
Corpus ID: 14116111
Stream cipher ZK-Crypt is a submission to the ECRYPT stream cipher project. The ”book stack” test for randomness from [2] was…
Expand
1999
1999
Logics for digital circuit verification : theory, algorithms, and applications
Gljm Geert Janssen
1999
Corpus ID: 221608040
ion .. 'L' { BV I ',' }+ 1 • 1 Formula Fixed_Point :: = 1 mu' I 1 nu' ) RV ' . ' Term . Term_l : : = Term_2 ( '->' I 1 <->' I 1…
Expand
Highly Cited
1988
Highly Cited
1988
A refined higher-order generally orthotropic C0 plate bending element
B. N. Pandya
,
T. Kant
1988
Corpus ID: 13838056
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE