Browse All Reviews
Data Encryption (E.3)
> Public Key Cryptosystems (E.3...)
All Media Types
1-10 of 117 Reviews about "
Public Key Cryptosystems (E.3...)
Beginning blockchain: a beginner’s guide to building blockchain solutions
Singhal B., Dhameja G., Panda P., Apress, New York, NY, 2018. 386 pp. Type: Book (978-1-484234-43-3)
Blockchain, a distributed ledger technology, is experiencing a surge of popular interest in the context of various domains, including electronic health records, supply chains, cryptocurrencies, and electronic voting, to name a few. A blockchain is...
Jul 8 2019
Quantum computing: an environment for intelligent large scale real application
Hassanien A., Elhoseny M., Kacprzyk J., Springer International Publishing, New York, NY, 2018. 505 pp. Type: Book (978-3-319636-38-2)
The book covers applications in quantum computing, along with some fundamental research. The application areas include cryptography, networking, image processing, optimization, and multi-user systems. The research work includes quantum field theor...
Nov 26 2018
A generalized attack on RSA type cryptosystems
Bunder M., Nitaj A., Susilo W., Tonien J. Theoretical Computer Science 704 74-81, 2017. Type: Article
The safety of the well-known RSA cryptosystem is based on the fact that, in general, it is computationally very hard to factorize large integers. Given two large prime numbers
, the public key is the pa...
Mar 23 2018
Short signatures from Diffie-Hellman: realizing almost compact public key
Seo J. Journal of Cryptology 30(3): 735-759, 2017. Type: Article
Seo proposes a size-reduced signature scheme, which applies the discrete logarithm principle (DLP) and relies on the computational Diffie-Hellman assumption (CDH) in the standard model. The author first introduces background knowledge, then presen...
Dec 21 2017
Emergent computation: a festschrift for Selim G. Akl
Adamatzky A., Springer International Publishing, New York, NY, 2016. 643 pp. Type: Book (978-3-319463-75-9)
The foreword, by David Rappaport and Kai Salomaa, is a very nice summary (five pages) of significant contributions made by Selim G. Akl in several areas of informatics during the course of a very productive career. (For the sake of transparency: I...
Aug 8 2017
Computational hardness of IFP and ECDLP
Yasuda M., Shimoyama T., Kogure J., Izu T. Applicable Algebra in Engineering, Communication and Computing 27(6): 493-521, 2016. Type: Article
It is generally recognized that elliptic curve cryptography (ECC) can attain the same level of security as RSA with a shorter key length. This paper offers practical evidence of this claim. For both RSA and ECC, security depends on the intractabil...
Apr 6 2017
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares
Libert B., Joye M., Yung M. Theoretical Computer Science 645(C): 1-24, 2016. Type: Article
Libert et al. develop a fully distributed, non-interactive, adaptively secure threshold signature scheme with scalable share size....
Jan 13 2017
Tightly secure signatures from lossy identification schemes
Abdalla M., Fouque P., Lyubashevsky V., Tibouchi M. Journal of Cryptology 29(3): 597-631, 2016. Type: Article
The authors have done a great job in presenting a potentially high-impact work. The paper studies signature schemes that are secure in the random oracle model, particularly those based on the Fiat-Shamir (heuristic) technique....
Sep 7 2016
(Leveled) fully homomorphic encryption without bootstrapping
Brakerski Z., Gentry C., Vaikuntanathan V. ACM Transactions on Computation Theory 6(3): Article No. 13, 2014. Type: Article
If you work with large amounts of data being hosted on public clouds, homomorphic encryption (HE) is an extremely innovative idea to add security layers to your data while it is being hosted and processed on third-party servers. Basically, HE allo...
Jul 24 2015
Certification authorities under attack: a plea for certificate legitimation
Oppliger R. IEEE Internet Computing 18(1): 40-47, 2014. Type: Article
The legitimacy of certification in public-key infrastructure (PKI) is crucial for Internet security. This article discusses recent attacks against certification authorities (CA), revealing two main issues: certificate revocation and certificate au...
May 5 2015
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2022 ThinkLoud, Inc.