A method for obtaining digital signatures and public-key cryptosystems (original) (raw)

Programming Techniques A Method for Obtaining Digital Signatures and Public- Key Cryptosystems

Catherine Liu

View PDFchevron_right

A new public-key cryptosystem as secure as factoring

Tatsuaki Okamoto

Lecture Notes in Computer Science, 1998

View PDFchevron_right

Applications to Public Key Cryptography

Alko Meijer

Algebra for Cryptologists, 2016

View PDFchevron_right

A Note on Public Key Cryptosystems

Shreya Jaiswal

International Journal of Advanced Networking and Applications

View PDFchevron_right

Public key cryptography

Jennifer Seberry

1987

View PDFchevron_right

Contribution to Privacy-Preserving Cryptographic Techniques

Man Ho Au

View PDFchevron_right

A Cryptographic Study of Some Digital Signature Schemes

Manoj Kumar

Eprint Arxiv Cs 0501010, 2005

View PDFchevron_right

Encryption: Strengths and Weaknesses of Public-key Cryptography

pwintthu aung

View PDFchevron_right

An Efficient RSA Public Key Encryption Scheme

Mustafa Al Fayoumi

Fifth International Conference on Information Technology: New Generations (itng 2008), 2008

View PDFchevron_right

A Novel Public Key Cryptosystem and Digital Signatures

Shamsa Kanwal, Saba Inam

European Journal of Engineering Science and Technology, 1970

View PDFchevron_right

Public-Key Cryptography Theory and Practice

jc zamora

View PDFchevron_right

A generalization of the ElGamal public-key cryptosystem

Rajitha Ranasinghe

Journal of Discrete Mathematical Sciences and Cryptography

View PDFchevron_right

Cryptography

Aanal Shah

View PDFchevron_right

Digital signatures with RSA and other public-key cryptosystems

Dorothy Denning

Communications of The ACM, 1984

View PDFchevron_right

A modification of the rsa public-key encryption procedure

Hunter Williams

IEEE Transactions on Information Theory, 1980

View PDFchevron_right

Public-Key Cryptography (Dagstuhl Seminar 11391)}}

Marc Fischlin

View PDFchevron_right

A public key cryptosystem and a signature scheme based on discrete logarithms

Khaled Nagaty

IEEE Transactions on Information Theory, 1985

View PDFchevron_right

A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme

Cuong Trinh

Information

View PDFchevron_right

On an efficient RSA public key encryption scheme

Manju Sanghi

Malaya Journal of Matematik, 2020

View PDFchevron_right

Public Key Cryptology – An Art of Keeping Secrecy and Authenticity

IJSTE - International Journal of Science Technology and Engineering

View PDFchevron_right

A New Idea in Digital Signature Schemes

Sattar Aboud

2006

View PDFchevron_right

Public key encryption

Wolfgang Küchlin

SIGSAM bulletin, 1987

View PDFchevron_right

Cryptographic Protocols

Richard A DeMillo

View PDFchevron_right

Amelioration of ElGamal Digital Signature Schemes

Marouane IHIA

Information & Security: An International Journal, 2019

View PDFchevron_right

On the security of public key cryptosystems with a double decryption mechanism

David Galindo

Information Processing Letters, 2008

View PDFchevron_right

Public Key Cryptosystems RSA and ElGamal : A Technical Report

Jaydip Sen

Technical Report of National Institute of Science and Technology (NIST), India, Summer Research Program, 2013 , 2013

View PDFchevron_right

A modification of the RSA public-key encryption procedure (Corresp

Hunter Williams

IEEE Transactions on Information Theory, 1980

View PDFchevron_right

A new digital signature scheme based on factoring and discrete logarithms

Nedal tahat

International Journal of Computer Mathematics, 2004

View PDFchevron_right

Patent Security system using RSA algorithm

thomas mcclure

View PDFchevron_right