Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences (Q2490987): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(4 intermediate revisions by 3 users not shown)
Property / author
 
Property / author: Zheng-Tao Jiang / rank
Normal rank
 
Property / author
 
Property / author: Zheng-Tao Jiang / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.amc.2005.01.097 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2040935641 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502510 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778852 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724587 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-key cryptosystems based on cubic finite field extensions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security analysis and improvement of a double-trapdoor encryption scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035724 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502496 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4046106 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A method for obtaining digital signatures and public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: A p + 1 Method of Factoring / rank
 
Normal rank
Property / cites work
 
Property / cites work: A modification of the RSA public-key encryption procedure (Corresp.) / rank
 
Normal rank

Latest revision as of 14:23, 24 June 2024

scientific article
Language Label Description Also known as
English
Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences
scientific article

    Statements

    Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    18 May 2006
    0 references
    0 references
    0 references
    0 references
    0 references
    public-key encryption scheme
    0 references
    LFSR higher (non) residuosity
    0 references
    one-wayness
    0 references
    semantic security
    0 references
    integer factorization
    0 references
    0 references