Search
for Topics
All Reviews
Browse All Reviews
>
Data (E)
>
Data Encryption (E.3)
> Public Key Cryptosystems (E.3...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 65 Reviews about "
Public Key Cryptosystems (E.3...)
":
Date Reviewed
Quantum computing: an environment for intelligent large scale real application
Hassanien A., Elhoseny M., Kacprzyk J., Springer International Publishing, New York, NY, 2018. 505 pp. Type: Book (978-3-319636-38-2)
The book covers applications in quantum computing, along with some fundamental research. The application areas include cryptography, networking, image processing, optimization, and multi-user systems. The research work includes quantum...
Nov 26 2018
A generalized attack on RSA type cryptosystems
Bunder M., Nitaj A., Susilo W., Tonien J. Theoretical Computer Science 704 74-81, 2017. Type: Article
The safety of the well-known RSA cryptosystem is based on the fact that, in general, it is computationally very hard to factorize large integers. Given two large prime numbers
p
and
q
, the public k...
Mar 23 2018
Short signatures from Diffie-Hellman: realizing almost compact public key
Seo J. Journal of Cryptology 30(3): 735-759, 2017. Type: Article
Seo proposes a size-reduced signature scheme, which applies the discrete logarithm principle (DLP) and relies on the computational Diffie-Hellman assumption (CDH) in the standard model. The author first introduces background knowledge,...
Dec 21 2017
Computational hardness of IFP and ECDLP
Yasuda M., Shimoyama T., Kogure J., Izu T. Applicable Algebra in Engineering, Communication and Computing 27(6): 493-521, 2016. Type: Article
It is generally recognized that elliptic curve cryptography (ECC) can attain the same level of security as RSA with a shorter key length. This paper offers practical evidence of this claim. For both RSA and ECC, security depends on the...
Apr 6 2017
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares
Libert B., Joye M., Yung M. Theoretical Computer Science 645(C): 1-24, 2016. Type: Article
Libert et al. develop a fully distributed, non-interactive, adaptively secure threshold signature scheme with scalable share size....
Jan 13 2017
Tightly secure signatures from lossy identification schemes
Abdalla M., Fouque P., Lyubashevsky V., Tibouchi M. Journal of Cryptology 29(3): 597-631, 2016. Type: Article
The authors have done a great job in presenting a potentially high-impact work. The paper studies signature schemes that are secure in the random oracle model, particularly those based on the Fiat-Shamir (heuristic) technique....
Sep 7 2016
(Leveled) fully homomorphic encryption without bootstrapping
Brakerski Z., Gentry C., Vaikuntanathan V. ACM Transactions on Computation Theory 6(3): Article No. 13, 2014. Type: Article
If you work with large amounts of data being hosted on public clouds, homomorphic encryption (HE) is an extremely innovative idea to add security layers to your data while it is being hosted and processed on third-party servers. Basica...
Jul 24 2015
Certification authorities under attack: a plea for certificate legitimation
Oppliger R. IEEE Internet Computing 18(1): 40-47, 2014. Type: Article
The legitimacy of certification in public-key infrastructure (PKI) is crucial for Internet security. This article discusses recent attacks against certification authorities (CA), revealing two main issues: certificate revocation and ce...
May 5 2015
Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness
Myers S., Sergi M., shelat a. Journal of Computer Security 21(5): 721-748, 2013. Type: Article
Ways to construct cryptographic schemes to protect against malicious attackers have received a great deal of attention in the area of formally provable security, in both academia and industry. It is very difficult to define new formal ...
Oct 6 2014
Introduction to public key infrastructures
Buchmann J., Karatsiolis E., Wiesmaier A., Springer Publishing Company, Incorporated, New York, NY, 2013. 208 pp. Type: Book (978-3-642406-56-0)
Much of what happens on the Internet today--for example, the distribution of software and music, electronic commerce, and the exchange of sensitive information--would not be practical without the security provided by ...
Mar 13 2014
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2023 ThinkLoud
®
Terms of Use
|
Privacy Policy