Sciweavers

1834 search results - page 87 / 367
» Public Key Cryptography
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
14 years 11 months ago
A Fast Semantically Secure Public Key Cryptosystem Based on Factoring
The cryptosystem proposed by Koyama is not semantically secure. Also, it is not secure against partial known plaintext attack, linearly related plaintext attack and low exponent a...
Sahadeo Padhye, Birendra Kumar Sharma
INFORMATICALT
2006
134views more  INFORMATICALT 2006»
14 years 11 months ago
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem
We know the necessity for information security becomes more widespread in these days, especially for hardware-based implementations such as smart cards chips for wireless applicati...
Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Je...
DAM
2007
63views more  DAM 2007»
14 years 11 months ago
Attacking a public key cryptosystem based on tree replacement
We point out several security flaws in the cryptosystem based on tree replacement systems proposed by Samuel, Thomas, Abisha and Subramanian at INDOCRYPT 2002. Due to the success...
Maria Isabel Gonzalez Vasco, David Pérez-Ga...
TISSEC
2008
77views more  TISSEC 2008»
14 years 11 months ago
Provably Secure Timed-Release Public Key Encryption
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...