A modification of the RSA public-key encryption procedure (Corresp.)
From MaRDI portal
Publication:3919596
DOI10.1109/TIT.1980.1056264zbMath0466.94018MaRDI QIDQ3919596
Publication date: 1980
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Related Items (30)
Public key authentication scheme over quaternions ⋮ A public-key cryptosystem utilizing cyclotomic fields ⋮ A review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass point ⋮ A key distribution system equivalent to factoring ⋮ Mathematical problems in cryptology ⋮ On-line/off-line digital signatures ⋮ A new public key cryptosystem over ℤn2* ⋮ Factorization, malleability and equivalent problems ⋮ Practical chosen ciphertext secure encryption from factoring ⋮ Uniform complexity and digital signatures ⋮ Improved low-computation partially blind signatures. ⋮ An efficient probabilistic encryption scheme ⋮ A Cartesian product construction for unconditionally secure authentication codes that permit arbitration ⋮ The influence of computers in the development of number theory ⋮ Secure sealed-bid online auctions using discreet cryptographic proofs ⋮ A cubic RSA code equivalent to factorization ⋮ A new framework for the design and analysis of identity-based identification schemes ⋮ Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences ⋮ Об использовании групп классов идеалов квадратичных полей для построения криптографических систем с открытым ключом ⋮ AN EFFICIENT SEVENTH POWER RESIDUE SYMBOL ALGORITHM ⋮ Efficient public key encryption with smallest ciphertext expansion from factoring ⋮ Practical Chosen Ciphertext Secure Encryption from Factoring ⋮ On the worst case of three algorithms for computing the Jacobi symbol ⋮ On the concealability of messages by the Williams public-key encryption scheme ⋮ Security proofs for identity-based identification and signature schemes ⋮ On the Rabin Signature ⋮ On the security of some variants of the RSA signature scheme ⋮ Improving the exact security of digital signature schemes ⋮ An Overview of Factoring ⋮ The Rabin cryptosystem revisited
This page was built for publication: A modification of the RSA public-key encryption procedure (Corresp.)