scientific article; zbMATH DE number 1303131
From MaRDI portal
Publication:4249647
Recommendations
- A Practical Public Key Cryptosystem from Paillier and Rabin Schemes
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- A public key cryptosystem based on a subgroup membership problem
- A new public-key cryptosystem over a quadratic order with quadratic decryption time.
- A new public key cryptosystem over \(\mathbb Z_{n^2}^\ast\)
Cited in
(64)- Cryptanalysis of the multi-power RSA cryptosystem variant
- New weak keys in RSA
- Homomorphic public-key cryptosystems and encrypting Boolean circuits
- Revisiting prime power RSA
- An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information
- Small secret exponent attack on RSA variant with modulus N=p^rq
- Group homomorphic encryption: characterizations, impossibility results, and applications
- scientific article; zbMATH DE number 2085418 (Why is no real title available?)
- A Practical Public Key Cryptosystem from Paillier and Rabin Schemes
- Efficient cryptosystems from \(2^k\)-th power residue symbols
- On the security of public key cryptosystems with a double decryption mechanism
- Efficient cryptosystems from \(2^k\)-th power residue symbols
- Factoring multi-power RSA moduli with primes sharing least or most significant bits
- A new public key cryptosystem based on Edwards curves
- Investigation of an attack on the multi-prime RSA cryptosystem based on cubic equations
- Public-key cryptosystem design based on factoring and discrete logarithms
- Some Public-Key Crypto-Functions as Intractable as Factorization
- A new generalization of the KMOV cryptosystem
- Progress in Cryptology – Mycrypt 2005
- New number-theoretic cryptographic primitives
- Benaloh's dense probabilistic encryption revisited
- Linearly homomorphic encryption from \(\mathsf {DDH}\)
- Formal and precise analysis of soundness of several shuffling schemes
- Public-Key Cryptosystems with Primitive Power Roots of Unity
- A verifiable secret shuffle of homomorphic encryptions
- Hybrid commitments and their applications to zero-knowledge proof systems
- Public-key cryptography and invariant theory
- An efficient IND-CCA2 secure Paillier-based cryptosystem
- Improved cryptanalysis of the multi-power RSA cryptosystem variant
- scientific article; zbMATH DE number 1618066 (Why is no real title available?)
- Provably secure Rabin-\(p\) cryptosystem in hybrid setting
- A public key cryptoscheme using bit-pairs with provable semantical security
- A new Rabin-type trapdoor permutation equivalent to factoring
- Secure function extensions to additively homomorphic cryptosystems
- Short-lived zero-knowledge proofs and signatures
- Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems
- Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\)
- Algebraic cryptography: new constructions and their security against provable break
- Two Generic Constructions of Probabilistic Cryptosystems and Their Applications
- Partial key exposure attacks on Prime Power RSA with non-consecutive blocks
- One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model
- Spreading alerts quietly and the subgroup escape problem
- Optimally sound sigma protocols under DCRA
- Cryptographic algorithms for privacy-preserving online applications
- A semantically secure public key cryptoscheme using bit-pair shadows
- On sigma-protocols and (packed) black-box secret sharing schemes
- An efficient privacy-preserving compressive data gathering scheme in WSNs
- Secure integration of asymmetric and symmetric encryption schemes
- Primeless factoring-based cryptography. Solving the complexity bottleneck of public-key generation
- On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption
- A new public key encryption scheme based on two cryptographic assumptions
- Fast square-free decomposition of integers using class groups
- Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption
- On non-Abelian homomorphic public-key cryptosystems
- A new public key cryptosystem over \(\mathbb Z_{n^2}^\ast\)
- Homomorphic Encryptions of Sums of Groups
- Vector commitments over rings and compressed \(\varSigma \)-protocols
- PUBLIC KEY CRYPTOSYSTEM USING A RECIPROCAL NUMBER WITH THE SAME INTRACTABILITY AS FACTORING A LARGE NUMBER
- A generalized attack on the multi-prime power RSA
- A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol
- Provably Secure Key Assignment Schemes from Factoring
- Element distinctness and bounded input size in private set intersection and related protocols
- A public key cryptosystem based on a subgroup membership problem
- A secure \(M + 1^{\text{st}}\) price auction protocol based on bit slice circuits
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249647)