Pages that link to "Item:Q4145254"
From MaRDI portal
The following pages link to A method for obtaining digital signatures and public-key cryptosystems (Q4145254):
Displaying 50 items.
- Quantum computation and quantum information (Q252779) (← links)
- A new cryptosystem using generalized Mersenne primes (Q258874) (← links)
- On the security of two identity-based signature schemes based on pairings (Q264198) (← links)
- Pairings in local fields and cryptography (Q266208) (← links)
- Relations between robustness and RKA security under public-key encryption (Q266278) (← links)
- Breaking RSA may be as difficult as factoring (Q271594) (← links)
- The space complexity analysis in the general number field sieve integer factorization (Q278727) (← links)
- Factoring multi-power RSA moduli with primes sharing least or most significant bits (Q285897) (← links)
- On the Clark-Jacob version of SPLICE/AS (Q287082) (← links)
- A simple approach for generating RSA keys (Q287121) (← links)
- Authenticated encryption schemes with linkage between message blocks (Q290252) (← links)
- An active attack on protocols for server-aided RSA signature computation (Q293187) (← links)
- Efficient construction of vote-tags to allow open objection to the tally in electronic elections (Q294830) (← links)
- Linear systolic multiplier/squarer for fast exponentiation (Q294863) (← links)
- Partitioned systolic architecture for modular multiplication in \(\mathrm{GF}(2^{m})\) (Q294869) (← links)
- NSA and dual EC\(\_\)DRBG: Déjà vu all over again? (Q297495) (← links)
- Primes in quadratic unique factorization domains (Q301417) (← links)
- On the number of strong primes (Q313427) (← links)
- Practical cryptanalysis of ISO 9796-2 and EMV signatures (Q315558) (← links)
- Bug attacks (Q321310) (← links)
- A branch hash function as a method of message synchronization in anonymous P2P conversations (Q326252) (← links)
- A structure-based chaotic hashing scheme (Q327795) (← links)
- Large classes of permutation polynomials over \(\mathbb {F}_{q^2}\) (Q329193) (← links)
- Cryptographic hardness of random local functions. Survey (Q332271) (← links)
- Public key protocols over the ring \(E_{p}^{(m)}\) (Q340183) (← links)
- A semantically secure public key cryptoscheme using bit-pair shadows (Q344780) (← links)
- Complexity-style resources in cryptography (Q385706) (← links)
- Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks (Q389368) (← links)
- Privacy and verifiability in voting systems: methods, developments and trends (Q395657) (← links)
- Are electroencephalogram (EEG) signals pseudo-random number generators? (Q396242) (← links)
- Small secret exponent attack on RSA variant with modulus \(N=p^rq\) (Q398942) (← links)
- On the inverses of some classes of permutations of finite fields (Q402572) (← links)
- Layouts for improved hierarchical parallel computations (Q405569) (← links)
- Parallel modular exponentiation using load balancing without precomputation (Q414922) (← links)
- A public key cryptosystem based on three new provable problems (Q418738) (← links)
- Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring \(Z_{N}\) (Q429602) (← links)
- Multi-verifier signatures (Q431790) (← links)
- First-order side channel attacks on Zhang's countermeasures (Q433061) (← links)
- Short undeniable signatures based on group homomorphisms (Q451120) (← links)
- User efficient recoverable off-line e-cash scheme with fast anonymity revoking (Q462753) (← links)
- Quantum-assisted QD-CFS signatures (Q473200) (← links)
- Sequential aggregate signatures with lazy verification from trapdoor permutations (Q476200) (← links)
- A general construction for monoid-based knapsack protocols (Q476358) (← links)
- Permutation polynomials from piecewise functions (Q492008) (← links)
- SimpleMatrix -- a multivariate public key cryptosystem (MPKC) for encryption (Q492017) (← links)
- Modeling energy-efficient secure communications in multi-mode wireless mobile devices (Q494039) (← links)
- Provably secure three party encrypted key exchange scheme with explicit authentication (Q497145) (← links)
- A rational framework for secure communication (Q497644) (← links)
- Quantum Boolean image denoising (Q501140) (← links)
- Energy efficient modular exponentiation for public-key cryptography based on bit forwarding techniques (Q503609) (← links)