Hardness amplification is one of the important reduction techniques in cryptography, and it has been extensively studied in the literature. The standard XOR lemma known in the literature evaluates the hardness in...
详细信息
We investigate the notion of bit-security for decisional cryptographic properties, as originally proposed in (Micciancio & Walter, Eurocrypt 2018), and its main variants and extensions, with the goal clarifying th...
详细信息
Quantum key distribution (QKD) allows Alice and Bob to share a secret key over an insecure channel with proven information-theoretic security against an adversary whose strategy is bounded only by the laws of physics....
详细信息
The k′-Lucas sequence is a significant generalization of the classical Lucas sequence, exhibiting various intriguing properties and applications across mathematics and cryptography. The study of k′ -Lucas-like seque...
详细信息
A secret sharing scheme is a cryptographic primitive that allows a dealer to share a secret among a set of parties, so that only authorized subsets of them can recover it. The access structure of the scheme is the fam...
详细信息
Running traditional symmetric encryption algorithms, such as AES, on resource-constrained devices presents significant challenges due to the limited computational resources available. A common bottleneck in these algo...
详细信息
Computing in the cloud is a burgeoning sector that requires architectures that are both lightweight and safe. In this study, we suggest a strong hybrid structure that is created by fusing existing structures of HUMMIN...
详细信息
In this paper we study the effect of using small prime numbers within the Okamoto-Uchiyama public key encryption scheme. We introduce two novel versions and prove their security. Then we show how to choose the system...
详细信息
The rapid advancement of quantum computing poses significant challenges to classical cryptographic systems. In response, the National Institute of Standards and Technology (NIST) initiated a challenge to develop "...
详细信息
暂无评论