Sciweavers

103 search results - page 4 / 21
» Security of public key cryptosystems based on Chebyshev Poly...
Sort
View
IMA
2001
Springer
117views Cryptology» more  IMA 2001»
14 years 1 months ago
An Identity Based Encryption Scheme Based on Quadratic Residues
We present a novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known value, such as his identity. We discuss the security of the ...
Clifford Cocks
PQCRYPTO
2010
298views Cryptology» more  PQCRYPTO 2010»
14 years 15 days ago
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
Abstract. In this paper a new structural attack on the McEliece/Niederreiter public key cryptosystem based on subcodes of generalized ReedSolomon codes proposed by Berger and Loidr...
Christian Wieschebrink
CANS
2009
Springer
194views Cryptology» more  CANS 2009»
14 years 3 months ago
Algebraic Attack on the MQQ Public Key Cryptosystem
Abstract. In this paper, we present an efficient attack on the multivariate Quadratic Quasigroups (MQQ) public key cryptosystem. Our cryptanalysis breaks the MQQ cryptosystem by so...
Mohamed Saied Emam Mohamed, Jintai Ding, Johannes ...
ACISP
2004
Springer
14 years 2 months ago
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
The XTR public key system was introduced at Crypto 2000. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead...
Dong-Guk Han, Jongin Lim, Kouichi Sakurai
CCS
1998
ACM
14 years 24 days ago
A New Public Key Cryptosystem Based on Higher Residues
This paper describes a new public-key cryptosystem based on the hardness of computing higher residues modulo a composite RSA integer. We introduce two versions of our scheme, one d...
David Naccache, Jacques Stern