Public Key Cryptography
From MaRDI portal
Publication:4648729
Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Mathematics for nonmathematicians (engineering, social sciences, etc.) (00A06) Applications to coding theory and cryptography of arithmetic geometry (14G50) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01) Authentication, digital signatures and secret sharing (94A62)
Recommendations
Cited in
(12)- RSA, DH and DSA in the wild
- An efficient certificate-based signature scheme in the standard model
- Cryptanalytic Attacks on RSA
- Primality testing and integer factorization in public-key cryptography
- scientific article; zbMATH DE number 2123733 (Why is no real title available?)
- Computational Number Theory and Modern Cryptography
- Public Key Encryption against Related Key Attacks
- scientific article; zbMATH DE number 857030 (Why is no real title available?)
- Public-key cryptography. State of the art and future directions. E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991. Final report
- scientific article; zbMATH DE number 1870586 (Why is no real title available?)
- Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller
- Mathematical foundations of public key cryptography
This page was built for publication: Public Key Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4648729)