-
121
An evaluation of the effects of broken cryptographic primitives on Bitcoin
Published 2015“…The Bitcoin cryptocurrency relies heavily on a variety of cryptographic functions and operations, which are currently assumed to be secure, but will inevitably be broken in the future. …”
Working paper -
122
On bitcoin security in the presence of broken cryptographic primitives
Published 2016“…Digital currencies like Bitcoin rely on cryptographic primitives to operate. However, past experience shows that cryptographic primitives do not last forever: increased computational power and advanced cryptanalysis cause primitives to break frequently, and motivate the development of new ones. …”
Conference item -
123
-
124
Security evaluation over lightweight cryptographic protocols
Published 2015“…Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large variety of cryptographic schemes have been developed. It can be claimed that proposing a cryptographic protocol to satisfy security and efficiency requirements is one of the significant challenging issues. …”
Get full text
Conference or Workshop Item -
125
-
126
-
127
-
128
-
129
A Memorable Communication Method Based on Cryptographic Accumulator
Published 2024-03-01Subjects: Get full text
Article -
130
A Survey on IoT Security Using Cryptographic Algorithms
Published 2023-01-01Subjects: Get full text
Article -
131
Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives
Published 2016-11-01“…Signcryption is a cryptographic primitive which offers the functionality of both digital signature and encryption with lower combined computational cost. …”
Get full text
Article -
132
-
133
Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic
Published 2020-09-01Subjects: “…cryptographic protocol…”
Get full text
Article -
134
Cryptographic Services Based on Elementary and Chaotic Cellular Automata
Published 2022-02-01Get full text
Article -
135
On another two cryptographic identities in universal Osborn loops
Published 2010-03-01“…These identities are found to be cryptographic in nature for universal Osborn loops and thereby called cryptographic identities. …”
Get full text
Article -
136
Research on the Maritime Communication Cryptographic Chip’s Compiler Optimization
Published 2017-08-01Subjects: Get full text
Article -
137
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
Published 2020-01-01“…Different studies have proved that exploiting implementation errors of cryptographic algorithms needs less effort as compared to attacking its mathematical structure. …”
Get full text
Article -
138
Cryptographic Data Security for Reliable Wireless Sensor Network
Published 2023-06-01Get full text
Article -
139
Enhanced Matrix Power Function for Cryptographic Primitive Construction
Published 2018-02-01“…A new enhanced matrix power function (MPF) is presented for the construction of cryptographic primitives. According to the definition in previously published papers, an MPF is an action of two matrices powering some base matrix on the left and right. …”
Get full text
Article -
140
A transport-independent general purpose cryptographic protocol
Published 2022-07-01“… The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. …”
Get full text
Article