Public Key Cryptography
DOI10.1002/9781118482261zbMATH Open1270.94001OpenAlexW4255701911MaRDI QIDQ4648729FDOQ4648729
Authors: Lynn M. Batten
Publication date: 16 November 2012
Full work available at URL: https://doi.org/10.1002/9781118482261
Recommendations
Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Mathematics for nonmathematicians (engineering, social sciences, etc.) (00A06) Applications to coding theory and cryptography of arithmetic geometry (14G50) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01) Authentication, digital signatures and secret sharing (94A62)
Cited In (12)
- Cryptanalytic Attacks on RSA
- An efficient certificate-based signature scheme in the standard model
- Primality testing and integer factorization in public-key cryptography
- Title not available (Why is that?)
- Computational Number Theory and Modern Cryptography
- Public Key Encryption against Related Key Attacks
- Title not available (Why is that?)
- Public-key cryptography. State of the art and future directions. E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991. Final report
- Title not available (Why is that?)
- Mathematical foundations of public key cryptography
- Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller
- RSA, DH and DSA in the wild
This page was built for publication: Public Key Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4648729)