Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Data (E) > Data Encryption (E.3) > Public Key Cryptosystems (E.3...)  
  1-10 of 65 Reviews about "Public Key Cryptosystems (E.3...)": Date Reviewed
  Quantum computing: an environment for intelligent large scale real application
Hassanien A., Elhoseny M., Kacprzyk J., Springer International Publishing, New York, NY, 2018. 505 pp.  Type: Book (978-3-319636-38-2)

The book covers applications in quantum computing, along with some fundamental research. The application areas include cryptography, networking, image processing, optimization, and multi-user systems. The research work includes quantum...

Nov 26 2018
  A generalized attack on RSA type cryptosystems
Bunder M., Nitaj A., Susilo W., Tonien J. Theoretical Computer Science 704 74-81, 2017.  Type: Article

The safety of the well-known RSA cryptosystem is based on the fact that, in general, it is computationally very hard to factorize large integers. Given two large prime numbers p and q, the public k...

Mar 23 2018
  Short signatures from Diffie-Hellman: realizing almost compact public key
Seo J. Journal of Cryptology 30(3): 735-759, 2017.  Type: Article

Seo proposes a size-reduced signature scheme, which applies the discrete logarithm principle (DLP) and relies on the computational Diffie-Hellman assumption (CDH) in the standard model. The author first introduces background knowledge,...

Dec 21 2017
  Computational hardness of IFP and ECDLP
Yasuda M., Shimoyama T., Kogure J., Izu T. Applicable Algebra in Engineering, Communication and Computing 27(6): 493-521, 2016.  Type: Article

It is generally recognized that elliptic curve cryptography (ECC) can attain the same level of security as RSA with a shorter key length. This paper offers practical evidence of this claim. For both RSA and ECC, security depends on the...

Apr 6 2017
  Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares
Libert B., Joye M., Yung M. Theoretical Computer Science 645(C): 1-24, 2016.  Type: Article

Libert et al. develop a fully distributed, non-interactive, adaptively secure threshold signature scheme with scalable share size....

Jan 13 2017
  Tightly secure signatures from lossy identification schemes
Abdalla M., Fouque P., Lyubashevsky V., Tibouchi M. Journal of Cryptology 29(3): 597-631, 2016.  Type: Article

The authors have done a great job in presenting a potentially high-impact work. The paper studies signature schemes that are secure in the random oracle model, particularly those based on the Fiat-Shamir (heuristic) technique....

Sep 7 2016
  (Leveled) fully homomorphic encryption without bootstrapping
Brakerski Z., Gentry C., Vaikuntanathan V. ACM Transactions on Computation Theory 6(3): Article No. 13, 2014.  Type: Article

If you work with large amounts of data being hosted on public clouds, homomorphic encryption (HE) is an extremely innovative idea to add security layers to your data while it is being hosted and processed on third-party servers. Basica...

Jul 24 2015
  Certification authorities under attack: a plea for certificate legitimation
Oppliger R. IEEE Internet Computing 18(1): 40-47, 2014.  Type: Article

The legitimacy of certification in public-key infrastructure (PKI) is crucial for Internet security. This article discusses recent attacks against certification authorities (CA), revealing two main issues: certificate revocation and ce...

May 5 2015
  Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness
Myers S., Sergi M., shelat a. Journal of Computer Security 21(5): 721-748, 2013.  Type: Article

Ways to construct cryptographic schemes to protect against malicious attackers have received a great deal of attention in the area of formally provable security, in both academia and industry. It is very difficult to define new formal ...

Oct 6 2014
  Introduction to public key infrastructures
Buchmann J., Karatsiolis E., Wiesmaier A., Springer Publishing Company, Incorporated, New York, NY, 2013. 208 pp.  Type: Book (978-3-642406-56-0)

Much of what happens on the Internet today--for example, the distribution of software and music, electronic commerce, and the exchange of sensitive information--would not be practical without the security provided by ...

Mar 13 2014
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy