Sciweavers

41 search results - page 1 / 9
» On the Security of Two Public Key Cryptosystems Using Non-Ab...
Sort
View
DCC
2004
IEEE
14 years 4 months ago
On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups
Maria Isabel Gonzalez Vasco, Dennis Hofheinz, Cons...
CRYPTO
2001
Springer
162views Cryptology» more  CRYPTO 2001»
13 years 9 months ago
New Public Key Cryptosystem Using Finite Non Abelian Groups
Most public key cryptosystems have been constructed based on abelian groups up to now. We propose a new public key cryptosystem built on finite non abelian groups in this paper. I...
Seong-Hun Paeng, Kil-Chan Ha, Jae Heon Kim, Seongt...
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 4 months ago
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant of Matsumoto Imai cryptosystem C . However Patarin later found that Little Dragon ...
Rajesh P. Singh, Anupam Saikia, B. K. Sarma
DCC
2000
IEEE
13 years 4 months ago
Discrete Logarithms: The Past and the Future
The first practical public key cryptosystem to be published, the Diffie-Hellman key exchange algorithm, was based on the assumption that discrete logarithms are hard to compute. T...
Andrew M. Odlyzko
EUROCRYPT
1999
Springer
13 years 9 months ago
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
Pascal Paillier