Sciweavers

230 search results - page 1 / 46
» A Complete Public-Key Cryptosystem
Sort
View
INDOCRYPT
2005
Springer
13 years 10 months ago
Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem
This paper revisits a public key cryptosystem which is based on finite string-rewriting systems. We consider a new approach for cryptanalysis of such proposals—the so-called com...
Heiko Stamer
ECCC
2006
46views more  ECCC 2006»
13 years 4 months ago
A Complete Public-Key Cryptosystem
Dima Grigoriev, Edward A. Hirsch, Konstantin Pervy...
CORR
2007
Springer
127views Education» more  CORR 2007»
13 years 4 months ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 4 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
JOC
2000
94views more  JOC 2000»
13 years 4 months ago
A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time
We present a new cryptosystem based on ideal arithmetic in quadratic orders. The method of our trapdoor is different from the Diffie
Sachar Paulus, Tsuyoshi Takagi