Results 151 to 160 of about 19,147 (192)
Some of the next articles are maybe not open access.
1986
It was only recently that public key cryptography developed into a precise mathematical subject, mainly as a response to the growing need for secure transmission of information via the electronic media. The main new idea was to base the security of cryptosystems on the intractability of number theory problems.
openaire +1 more source
It was only recently that public key cryptography developed into a precise mathematical subject, mainly as a response to the growing need for secure transmission of information via the electronic media. The main new idea was to base the security of cryptosystems on the intractability of number theory problems.
openaire +1 more source
Public-key ID-based cryptosystem
Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology, 2002It is shown how a chosen-public-key attack can compromise the ID-based cryptosystem of S. Tsujii and T. Itoh (1989), as well as most of the existing public-key cryptosystems. The authors present a scheme which can withstand the chosen-public-key attack, based on the concept of an cryptosystem.
H.-M. Sun, T. Hwang
openaire +1 more source
KETA: Public-key symmetric cryptosystem
2010 4th International Conference on Application of Information and Communication Technologies, 2010The new method of encrypting has been developed. The difference from existing methods is that the identifier of one of the agreed plaintexts (resource files) and the number of the combinatorial permutation of symbols of the indicated resource file is being transmitted, but not the ciphertext. In this connection the developed cryptosystem was named KETA
B. T. Kabulov, N. B. Tashpulatova
openaire +1 more source
Distributed public key cryptosystems
1998The cryptographic community has developed many tools to incorporate distributed trust mechanisms into cryptographic primitives and protocols as well as primitives where parties are naturally distributed. Since the fastest growing paradigm in computing is distributed systems and communication networks, the importance of distributed mechanisms has been ...
Yair Frankel, Moti Yung
openaire +1 more source
Indifferentiability for Public Key Cryptosystems
2020We initiate the study of indifferentiability for public key encryption and other public key primitives. Our main results are definitions and constructions of public key cryptosystems that are indifferentiable from ideal cryptosystems, in the random oracle model.
Mark Zhandry, Cong Zhang
openaire +1 more source
Protocols for Public Key Cryptosystems
1980 IEEE Symposium on Security and Privacy, 1980New Cryptographic protocols which take full advantage of the unique properties of public key cryptosystems are now evolving. Several protocols for public key distribution and for digital signatures are briefly compared with each other and with the conventional alternative.
openaire +1 more source
Multivariate Public Key Cryptosystems
2017This paper presents a survey on the multivariate public key cryptosystem (MPKC), which is a public key cryptosystem whose public key is a set of multivariate quadratic forms over a finite field.
openaire +1 more source
Searching for Public-Key Cryptosystems
1984 IEEE Symposium on Security and Privacy, 1984This article suggests the use of undecidable problems in constructing public-key cryptosystems. Any such system must still be in NP, but intuitive arguments suggest that this approach might be a reasonable alternative to the use of NP-complete problems.
openaire +1 more source
Cancer treatment and survivorship statistics, 2022
Ca-A Cancer Journal for Clinicians, 2022Kimberly D Miller +2 more
exaly

