Sciweavers

230 search results - page 9 / 46
» A Complete Public-Key Cryptosystem
Sort
View
ARTCOM
2009
IEEE
14 years 2 months ago
Public Key Cryptosystems Based on Chaotic-Chebyshev Polynomials
Gnanajeyaraman Rajaram, K. Ramar, Prasadh K. K. Pi...
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
ASIACRYPT
2004
Springer
14 years 1 months ago
On the Security of MOR Public Key Cryptosystem
In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nah...
EUROCRYPT
1999
Springer
13 years 12 months ago
New Public Key Cryptosystems Based on the Dependent-RSA Problems
Since the Diffie-Hellman paper, asymmetric encryption has been a very important topic, and furthermore ever well studied. However, between the efficiency of RSA and the security of...
David Pointcheval