Sciweavers

1562 search results - page 53 / 313
» Mathematics, Cryptology, Security
Sort
View
IMA
2001
Springer
117views Cryptology» more  IMA 2001»
14 years 16 days ago
An Identity Based Encryption Scheme Based on Quadratic Residues
We present a novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known value, such as his identity. We discuss the security of the ...
Clifford Cocks
CRYPTO
2000
Springer
128views Cryptology» more  CRYPTO 2000»
14 years 13 days ago
The XTR Public Key System
This paper introduces the XTR public key system. XTR is based on a new method to represent elements of a subgroup of a multiplicative group of a finite field. Application of XTR ...
Arjen K. Lenstra, Eric R. Verheul
ASIACRYPT
1999
Springer
14 years 11 days ago
Doing More with Fewer Bits
We present a variant of the Diffie-Hellman scheme in which the number of bits exchanged is one third of what is used in the classical Diffie-Hellman scheme, while the offered secu...
Andries E. Brouwer, Ruud Pellikaan, Eric R. Verheu...
CRYPTO
1997
Springer
207views Cryptology» more  CRYPTO 1997»
14 years 7 days ago
Public-Key Cryptosystems from Lattice Reduction Problems
We present a new proposal for a trapdoor one-way function, from which we derive public-key encryption and digital signatures. The security of the new construction is based on the ...
Oded Goldreich, Shafi Goldwasser, Shai Halevi
IMA
1997
Springer
106views Cryptology» more  IMA 1997»
14 years 7 days ago
Hash Functions and MAC Algorithms Based on Block Ciphers
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It discusses the main requirements for these cryptographic primitives, motivates these...
Bart Preneel