A modification of the RSA public-key encryption procedure (Corresp.)

From MaRDI portal
Publication:3919596

DOI10.1109/TIT.1980.1056264zbMath0466.94018MaRDI QIDQ3919596

Hugh C. Williams

Publication date: 1980

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)




Related Items (30)

Public key authentication scheme over quaternionsA public-key cryptosystem utilizing cyclotomic fieldsA review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass pointA key distribution system equivalent to factoringMathematical problems in cryptologyOn-line/off-line digital signaturesA new public key cryptosystem over ℤn2*Factorization, malleability and equivalent problemsPractical chosen ciphertext secure encryption from factoringUniform complexity and digital signaturesImproved low-computation partially blind signatures.An efficient probabilistic encryption schemeA Cartesian product construction for unconditionally secure authentication codes that permit arbitrationThe influence of computers in the development of number theorySecure sealed-bid online auctions using discreet cryptographic proofsA cubic RSA code equivalent to factorizationA new framework for the design and analysis of identity-based identification schemesTwo methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequencesОб использовании групп классов идеалов квадратичных полей для построения криптографических систем с открытым ключомAN EFFICIENT SEVENTH POWER RESIDUE SYMBOL ALGORITHMEfficient public key encryption with smallest ciphertext expansion from factoringPractical Chosen Ciphertext Secure Encryption from FactoringOn the worst case of three algorithms for computing the Jacobi symbolOn the concealability of messages by the Williams public-key encryption schemeSecurity proofs for identity-based identification and signature schemesOn the Rabin SignatureOn the security of some variants of the RSA signature schemeImproving the exact security of digital signature schemesAn Overview of FactoringThe Rabin cryptosystem revisited




This page was built for publication: A modification of the RSA public-key encryption procedure (Corresp.)