On cryptographic assumptions and challenges

229Citations
Citations of this article
71Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classification of such assumptions based on the complexity of falsifying them (in case they happen not to be true) by creating a challenge (competition) to their validity. As an outcome of this classification we propose several open problems regarding cryptographic tasks that currently do not have a good challenge of that sort. The most outstanding one is the design of an efficient block ciphers. © International Association for Cryptologic Research 2003.

Cite

CITATION STYLE

APA

Naor, M. (2003). On cryptographic assumptions and challenges. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2729, 96–109. https://doi.org/10.1007/978-3-540-45146-4_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free