On the design of cryptographic primitives
From MaRDI portal
Abstract: The main objective of this work is twofold. On the one hand, it gives a brief overview of the area of two-party cryptographic protocols. On the other hand, it proposes new schemes and guidelines for improving the practice of robust protocol design. In order to achieve such a double goal, a tour through the descriptions of the two main cryptographic primitives is carried out. Within this survey, some of the most representative algorithms based on the Theory of Finite Fields are provided and new general schemes and specific algorithms based on Graph Theory are proposed.
Recommendations
Cites work
- scientific article; zbMATH DE number 3956969 (Why is no real title available?)
- scientific article; zbMATH DE number 4023423 (Why is no real title available?)
- scientific article; zbMATH DE number 4037759 (Why is no real title available?)
- scientific article; zbMATH DE number 1796970 (Why is no real title available?)
- A logic of authentication
- New directions in cryptography
- On the security of public key protocols
- The Byzantine Generals Problem
- The knowledge complexity of interactive proof-systems
- Zero-knowledge proofs of identity
Cited in
(7)- scientific article; zbMATH DE number 1952885 (Why is no real title available?)
- Practical design of two-party cryptographic protocols
- The design of the ICE encryption algorithm
- Designs, codes and cryptography. Proceedings of the 1st ACM conference on computer and communications security in honour of Gus Simmons, Fairfax, VA, USA, November 1993
- On the bit security of cryptographic primitives
- Primitivity of PRESENT and other lightweight ciphers
- Designing efficient dyadic operations for cryptographic applications
This page was built for publication: On the design of cryptographic primitives
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q850775)