The Security of Hardware-Based Omega(n^2) Cryptographic One-Way Functions: Beyond Satisfiability and P=NP.
Javier A. Arroyo-FigueroaPublished in: CoRR (2016)
Keyphrases
- random number generator
- security properties
- security protocols
- key management
- protection schemes
- information security
- random number
- smart card
- access control
- encryption decryption
- low cost
- encryption scheme
- security requirements
- real time
- advanced encryption standard
- security issues
- high assurance
- encryption key
- elliptic curve cryptography
- trusted computing
- cryptographic protocols
- intrusion detection
- hardware and software
- network security
- protection scheme
- security systems
- satisfiability problem
- fuzzy vault
- hardware implementation
- secure communication
- stream cipher
- cryptographic algorithms
- computer systems
- security analysis
- np complete