Showing 121 - 140 results of 4,223 for search '"cryptographer"', query time: 0.17s Refine Results
  1. 121

    An evaluation of the effects of broken cryptographic primitives on Bitcoin by Giechaskiel, I

    Published 2015
    “…The Bitcoin cryptocurrency relies heavily on a variety of cryptographic functions and operations, which are currently assumed to be secure, but will inevitably be broken in the future. …”
    Working paper
  2. 122

    On bitcoin security in the presence of broken cryptographic primitives by Giechaskiel, I, Cremers, C, Rasmussen, K

    Published 2016
    “…Digital currencies like Bitcoin rely on cryptographic primitives to operate. However, past experience shows that cryptographic primitives do not last forever: increased computational power and advanced cryptanalysis cause primitives to break frequently, and motivate the development of new ones. …”
    Conference item
  3. 123
  4. 124

    Security evaluation over lightweight cryptographic protocols by Ghoreishi, S. M., Razak, S. A., Isnin, I. F., Chizari, H.

    Published 2015
    “…Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large variety of cryptographic schemes have been developed. It can be claimed that proposing a cryptographic protocol to satisfy security and efficiency requirements is one of the significant challenging issues. …”
    Get full text
    Conference or Workshop Item
  5. 125
  6. 126
  7. 127
  8. 128
  9. 129
  10. 130
  11. 131

    Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives by S. Sree Vivek, Sharmila Deva Selvi, Pallavi Chandrasekar, C. Pandu Rangan

    Published 2016-11-01
    “…Signcryption is a cryptographic primitive which offers the functionality of both digital signature and encryption with lower combined computational cost. …”
    Get full text
    Article
  12. 132
  13. 133
  14. 134
  15. 135

    On another two cryptographic identities in universal Osborn loops by T. G. Jaiyéolá, J. O. Adéníran

    Published 2010-03-01
    “…These identities are found to be cryptographic in nature for universal Osborn loops and thereby called cryptographic identities. …”
    Get full text
    Article
  16. 136
  17. 137

    Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols by Anum Sajjad, Mehreen Afzal, Mian Muhammad Waseem Iqbal, Haider Abbas, Rabia Latif, Rana Aamir Raza

    Published 2020-01-01
    “…Different studies have proved that exploiting implementation errors of cryptographic algorithms needs less effort as compared to attacking its mathematical structure. …”
    Get full text
    Article
  18. 138
  19. 139

    Enhanced Matrix Power Function for Cryptographic Primitive Construction by Eligijus Sakalauskas

    Published 2018-02-01
    “…A new enhanced matrix power function (MPF) is presented for the construction of cryptographic primitives. According to the definition in previously published papers, an MPF is an action of two matrices powering some base matrix on the left and right. …”
    Get full text
    Article
  20. 140

    A transport-independent general purpose cryptographic protocol by К. Лесогорський, Е. Жаріков

    Published 2022-07-01
    “… The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. …”
    Get full text
    Article