Results 1 - 10
of
2,751
How to Watermark Cryptographic Functions ∗
"... We introduce a notion of watermarking for cryptographic functions and propose a concrete scheme for watermarking cryptographic functions. Informally speaking, a digital watermark-ing scheme for cryptographic functions embeds information, called a mark, into functions such as one-way functions and de ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
We introduce a notion of watermarking for cryptographic functions and propose a concrete scheme for watermarking cryptographic functions. Informally speaking, a digital watermark-ing scheme for cryptographic functions embeds information, called a mark, into functions such as one-way functions
Survey and future trends of efficient cryptographic function implementations on
"... Survey and future trends of efficient cryptographic function implementations on ..."
Abstract
- Add to MetaCart
Survey and future trends of efficient cryptographic function implementations on
Non-Separable Cryptographic Functions
"... We study nonlinear Boolean functions that are used in cryptography, especially in block and stream ciphers. We point out possible cryptographic weaknesses of the so-called separable functions. A characteristic of these functions is that they can be transformed into ones that are composed of two “sub ..."
Abstract
- Add to MetaCart
We study nonlinear Boolean functions that are used in cryptography, especially in block and stream ciphers. We point out possible cryptographic weaknesses of the so-called separable functions. A characteristic of these functions is that they can be transformed into ones that are composed of two
Distributed Cryptographic Function Application Protocols
- INFORMATION AND COMMUNICATIONS SECURITY, FIRST INTERNATIONAL CONFERENCE, ICICS’97
, 1997
"... Recovery of data stored in a fault-tolerant and secure way requires encryption and / or decryption of data with secret cryptographic functions, for which a group of processors should be responsible. For this purpose, the here-introduced distributed cryptographic function application protocols (DCF ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
Recovery of data stored in a fault-tolerant and secure way requires encryption and / or decryption of data with secret cryptographic functions, for which a group of processors should be responsible. For this purpose, the here-introduced distributed cryptographic function application protocols
Matrix representation of cryptographic functions
"... The Discrete Logarithm and the Diffie-Hellman are two hard computational problems, closely related to cryptography and its applications. The computational equivalence of these problems has been proved only for some special cases. In this study, using LU-decomposition to Vandermonde matrices, we are ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
The Discrete Logarithm and the Diffie-Hellman are two hard computational problems, closely related to cryptography and its applications. The computational equivalence of these problems has been proved only for some special cases. In this study, using LU-decomposition to Vandermonde matrices, we are able to transform the two problems in terms of matrices, thus giving a new perspective to their equivalence. A first study on matrix expressions for the Double and Multiple Discrete Logarithms is also presented. 1
Structures of Highly Nonlinear Cryptographic Functions
"... Summary This paper studies the properties and constructions of nonlinear Boolean functions, which are a core component of cryptographic primitives including data encryption algorithms and one-way hash functions. A main contribution of this paper is to completely characterise the structures of crypto ..."
Abstract
- Add to MetaCart
Summary This paper studies the properties and constructions of nonlinear Boolean functions, which are a core component of cryptographic primitives including data encryption algorithms and one-way hash functions. A main contribution of this paper is to completely characterise the structures
GAC - the Criterion for Global Avalanche Characteristics of Cryptographic Functions
- Journal of Universal Computer Science
, 1995
"... Abstract: We show that some widely accepted criteria for cryptographic functions, including the strict avalanche criterion (SAC) and the propagation criterion, have various limitations in capturing properties of vital importance to cryptographic algorithms, and propose a new criterion called GAC tom ..."
Abstract
-
Cited by 41 (4 self)
- Add to MetaCart
Abstract: We show that some widely accepted criteria for cryptographic functions, including the strict avalanche criterion (SAC) and the propagation criterion, have various limitations in capturing properties of vital importance to cryptographic algorithms, and propose a new criterion called GAC
Cryptographic functions from worst-case complexity assumptions
, 2007
"... Lattice problems have been suggested as a potential source of computational hardness to beused in the construction of cryptographic functions that are provably hard to break. A remarkable feature of lattice-based cryptographic functions is that they can be proved secure (that is,hard to break on t ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
Lattice problems have been suggested as a potential source of computational hardness to beused in the construction of cryptographic functions that are provably hard to break. A remarkable feature of lattice-based cryptographic functions is that they can be proved secure (that is,hard to break
Survey and future trends of efficient cryptographic function implementations on
"... Many standard cryptographic functions are designed to benefit from hardware specific implementations. As a result, there have been a large number of highly efficient ASIC and FPGA hardware based implementations of standard cryptographic functions. Previously, hardware accelerated devices were only a ..."
Abstract
- Add to MetaCart
Many standard cryptographic functions are designed to benefit from hardware specific implementations. As a result, there have been a large number of highly efficient ASIC and FPGA hardware based implementations of standard cryptographic functions. Previously, hardware accelerated devices were only
Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions
- Journal of Universal Computer Science
, 1995
"... Abstract: The connections among the various nonlinearity criteria is currently an important topic in the area of designing and analyzing cryptographic functions. In this paper we show a quantitative relationship between propagation characteristics and nonlinearity, two critical indicators of the cry ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
Abstract: The connections among the various nonlinearity criteria is currently an important topic in the area of designing and analyzing cryptographic functions. In this paper we show a quantitative relationship between propagation characteristics and nonlinearity, two critical indicators
Results 1 - 10
of
2,751