Results 151 to 160 of about 19,147 (192)
Some of the next articles are maybe not open access.

Public Key Cryptosystems

1986
It was only recently that public key cryptography developed into a precise mathematical subject, mainly as a response to the growing need for secure transmission of information via the electronic media. The main new idea was to base the security of cryptosystems on the intractability of number theory problems.
openaire   +1 more source

Public-key ID-based cryptosystem

Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology, 2002
It is shown how a chosen-public-key attack can compromise the ID-based cryptosystem of S. Tsujii and T. Itoh (1989), as well as most of the existing public-key cryptosystems. The authors present a scheme which can withstand the chosen-public-key attack, based on the concept of an cryptosystem.
H.-M. Sun, T. Hwang
openaire   +1 more source

KETA: Public-key symmetric cryptosystem

2010 4th International Conference on Application of Information and Communication Technologies, 2010
The new method of encrypting has been developed. The difference from existing methods is that the identifier of one of the agreed plaintexts (resource files) and the number of the combinatorial permutation of symbols of the indicated resource file is being transmitted, but not the ciphertext. In this connection the developed cryptosystem was named KETA
B. T. Kabulov, N. B. Tashpulatova
openaire   +1 more source

Distributed public key cryptosystems

1998
The cryptographic community has developed many tools to incorporate distributed trust mechanisms into cryptographic primitives and protocols as well as primitives where parties are naturally distributed. Since the fastest growing paradigm in computing is distributed systems and communication networks, the importance of distributed mechanisms has been ...
Yair Frankel, Moti Yung
openaire   +1 more source

Indifferentiability for Public Key Cryptosystems

2020
We initiate the study of indifferentiability for public key encryption and other public key primitives. Our main results are definitions and constructions of public key cryptosystems that are indifferentiable from ideal cryptosystems, in the random oracle model.
Mark Zhandry, Cong Zhang
openaire   +1 more source

Protocols for Public Key Cryptosystems

1980 IEEE Symposium on Security and Privacy, 1980
New Cryptographic protocols which take full advantage of the unique properties of public key cryptosystems are now evolving. Several protocols for public key distribution and for digital signatures are briefly compared with each other and with the conventional alternative.
openaire   +1 more source

Multivariate Public Key Cryptosystems

2017
This paper presents a survey on the multivariate public key cryptosystem (MPKC), which is a public key cryptosystem whose public key is a set of multivariate quadratic forms over a finite field.
openaire   +1 more source

Searching for Public-Key Cryptosystems

1984 IEEE Symposium on Security and Privacy, 1984
This article suggests the use of undecidable problems in constructing public-key cryptosystems. Any such system must still be in NP, but intuitive arguments suggest that this approach might be a reasonable alternative to the use of NP-complete problems.
openaire   +1 more source

Cancer treatment and survivorship statistics, 2022

Ca-A Cancer Journal for Clinicians, 2022
Kimberly D Miller   +2 more
exaly  

Home - About - Disclaimer - Privacy