• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,751
Next 10 →

How to Watermark Cryptographic Functions ∗

by Ryo Nishimaki
"... We introduce a notion of watermarking for cryptographic functions and propose a concrete scheme for watermarking cryptographic functions. Informally speaking, a digital watermark-ing scheme for cryptographic functions embeds information, called a mark, into functions such as one-way functions and de ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
We introduce a notion of watermarking for cryptographic functions and propose a concrete scheme for watermarking cryptographic functions. Informally speaking, a digital watermark-ing scheme for cryptographic functions embeds information, called a mark, into functions such as one-way functions

Survey and future trends of efficient cryptographic function implementations on

by unknown authors
"... Survey and future trends of efficient cryptographic function implementations on ..."
Abstract - Add to MetaCart
Survey and future trends of efficient cryptographic function implementations on

Non-Separable Cryptographic Functions

by Yuliang Zheng, Xian-mo Zhang
"... We study nonlinear Boolean functions that are used in cryptography, especially in block and stream ciphers. We point out possible cryptographic weaknesses of the so-called separable functions. A characteristic of these functions is that they can be transformed into ones that are composed of two “sub ..."
Abstract - Add to MetaCart
We study nonlinear Boolean functions that are used in cryptography, especially in block and stream ciphers. We point out possible cryptographic weaknesses of the so-called separable functions. A characteristic of these functions is that they can be transformed into ones that are composed of two

Distributed Cryptographic Function Application Protocols

by André Postma, Thijs Krol, Egbert Molenkamp - INFORMATION AND COMMUNICATIONS SECURITY, FIRST INTERNATIONAL CONFERENCE, ICICS’97 , 1997
"... Recovery of data stored in a fault-tolerant and secure way requires encryption and / or decryption of data with secret cryptographic functions, for which a group of processors should be responsible. For this purpose, the here-introduced distributed cryptographic function application protocols (DCF ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Recovery of data stored in a fault-tolerant and secure way requires encryption and / or decryption of data with secret cryptographic functions, for which a group of processors should be responsible. For this purpose, the here-introduced distributed cryptographic function application protocols

Matrix representation of cryptographic functions

by G. C. Meletiou, E. C. Laskari, D. K. Tasoulis, M. N. Vrahatis
"... The Discrete Logarithm and the Diffie-Hellman are two hard computational problems, closely related to cryptography and its applications. The computational equivalence of these problems has been proved only for some special cases. In this study, using LU-decomposition to Vandermonde matrices, we are ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
The Discrete Logarithm and the Diffie-Hellman are two hard computational problems, closely related to cryptography and its applications. The computational equivalence of these problems has been proved only for some special cases. In this study, using LU-decomposition to Vandermonde matrices, we are able to transform the two problems in terms of matrices, thus giving a new perspective to their equivalence. A first study on matrix expressions for the Double and Multiple Discrete Logarithms is also presented. 1

Structures of Highly Nonlinear Cryptographic Functions

by Jennifer Seberry, Xian-mo Zhang, Yuliang Zheng
"... Summary This paper studies the properties and constructions of nonlinear Boolean functions, which are a core component of cryptographic primitives including data encryption algorithms and one-way hash functions. A main contribution of this paper is to completely characterise the structures of crypto ..."
Abstract - Add to MetaCart
Summary This paper studies the properties and constructions of nonlinear Boolean functions, which are a core component of cryptographic primitives including data encryption algorithms and one-way hash functions. A main contribution of this paper is to completely characterise the structures

GAC - the Criterion for Global Avalanche Characteristics of Cryptographic Functions

by Xian-mo Zhang, Yuliang Zheng - Journal of Universal Computer Science , 1995
"... Abstract: We show that some widely accepted criteria for cryptographic functions, including the strict avalanche criterion (SAC) and the propagation criterion, have various limitations in capturing properties of vital importance to cryptographic algorithms, and propose a new criterion called GAC tom ..."
Abstract - Cited by 41 (4 self) - Add to MetaCart
Abstract: We show that some widely accepted criteria for cryptographic functions, including the strict avalanche criterion (SAC) and the propagation criterion, have various limitations in capturing properties of vital importance to cryptographic algorithms, and propose a new criterion called GAC

Cryptographic functions from worst-case complexity assumptions

by Daniele Micciancio , 2007
"... Lattice problems have been suggested as a potential source of computational hardness to beused in the construction of cryptographic functions that are provably hard to break. A remarkable feature of lattice-based cryptographic functions is that they can be proved secure (that is,hard to break on t ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
Lattice problems have been suggested as a potential source of computational hardness to beused in the construction of cryptographic functions that are provably hard to break. A remarkable feature of lattice-based cryptographic functions is that they can be proved secure (that is,hard to break

Survey and future trends of efficient cryptographic function implementations on

by unknown authors
"... Many standard cryptographic functions are designed to benefit from hardware specific implementations. As a result, there have been a large number of highly efficient ASIC and FPGA hardware based implementations of standard cryptographic functions. Previously, hardware accelerated devices were only a ..."
Abstract - Add to MetaCart
Many standard cryptographic functions are designed to benefit from hardware specific implementations. As a result, there have been a large number of highly efficient ASIC and FPGA hardware based implementations of standard cryptographic functions. Previously, hardware accelerated devices were only

Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions

by Jennifer Seberry, Xian-mo Zhang, Yuliang Zheng - Journal of Universal Computer Science , 1995
"... Abstract: The connections among the various nonlinearity criteria is currently an important topic in the area of designing and analyzing cryptographic functions. In this paper we show a quantitative relationship between propagation characteristics and nonlinearity, two critical indicators of the cry ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
Abstract: The connections among the various nonlinearity criteria is currently an important topic in the area of designing and analyzing cryptographic functions. In this paper we show a quantitative relationship between propagation characteristics and nonlinearity, two critical indicators
Next 10 →
Results 1 - 10 of 2,751
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University