Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences
From MaRDI portal
Publication:2490987
Recommendations
- On the \(k\)-th order LFSR sequence with public key cryptosystems
- Primitive transformation shift registers over finite fields
- Public-key cryptosystems based on cubic finite field extensions
- scientific article; zbMATH DE number 4148025
- The provable security public key cryptosystem based on 8-th order LFSR sequence
Cites work
- scientific article; zbMATH DE number 1618044 (Why is no real title available?)
- scientific article; zbMATH DE number 1722681 (Why is no real title available?)
- scientific article; zbMATH DE number 176555 (Why is no real title available?)
- scientific article; zbMATH DE number 3460351 (Why is no real title available?)
- scientific article; zbMATH DE number 1504547 (Why is no real title available?)
- scientific article; zbMATH DE number 1504559 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- A modification of the RSA public-key encryption procedure (Corresp.)
- A p + 1 Method of Factoring
- An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information
- New directions in cryptography
- Public-key cryptosystems based on cubic finite field extensions
- Security analysis and improvement of a double-trapdoor encryption scheme
Cited in
(2)
This page was built for publication: Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2490987)