-
4
-
-
0017018484
-
New Directions in Cryptography
-
W. Diffie and M. Hellman, "New Directions in Cryptography", IEEE Trans. Information Theory, Vol. IT-22, No 6, (1976), 644-654.
-
(1976)
IEEE Trans. Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
6
-
-
78650603590
-
Multivariate Quadratic Trapdoor Functions Based on Multivariate Quadratic Quasigroups
-
Cambridge, Massachusetts, USA, March 24-26
-
D. Gligoroski, S. Markovski and S. J. Knapskog, "Multivariate Quadratic Trapdoor Functions Based on Multivariate Quadratic Quasigroups", Proceedings of the AMERICAN CONFERENCE ON APPLIED MATHEMATICS (MATH '08), Cambridge, Massachusetts, USA, March 24-26, 2008.
-
(2008)
Proceedings of the AMERICAN CONFERENCE ON APPLIED MATHEMATICS (MATH '08)
-
-
Gligoroski, D.1
Markovski, S.2
Knapskog, S.J.3
-
7
-
-
84958655849
-
Public-Key CryptoSystems from Lattice Reduction Problems
-
O. Goldreich, S. Goldwasser and S. Halevi, "Public-Key CryptoSystems from Lattice Reduction Problems", LNCS, Vol. 1294, pp. 112-131, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 112-131
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
8
-
-
62349136908
-
-
Helion Technology Limited, ModExp, February 16, 2007, Available
-
Helion Technology Limited, "Modular Exponentiation Engine for RSA and DH (ModExp)", February 16, 2007, Available: http://www.xilinx.com/ publications/3rd\-party/products/Helion\-ModExp\-AllianceCORE\-data\-sheet.pdf
-
Modular Exponentiation Engine for RSA and DH
-
-
-
9
-
-
84947808606
-
NTRU: A ring based public key cryptosystem
-
J. Hoffstein, J. Pipher and J. H. Silverman, "NTRU: A ring based public key cryptosystem", LNCS, Vol. 1433 pp. 267-288, 1998.
-
(1998)
LNCS
, vol.1433
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.H.3
-
10
-
-
85022127411
-
Algebraic methods for constructing asymmetric cryptosysytems
-
Proceedings of 3rd Intern. Conf. AAECC-3
-
H. Imai and T. Matsumoto, "Algebraic methods for constructing asymmetric cryptosysytems", in Proceedings of 3rd Intern. Conf. AAECC-3, LNCS Vol. 29, pp. 108-119, 1985.
-
(1985)
LNCS
, vol.29
, pp. 108-119
-
-
Imai, H.1
Matsumoto, T.2
-
11
-
-
84957693117
-
Unbalanced Oil and Vinegar signature schemes
-
Advances in Cryptology, EUROCRYPT 1999
-
A. Kipnis, J. Patarin, and L. Goubin, "Unbalanced Oil and Vinegar signature schemes", in Advances in Cryptology, EUROCRYPT 1999, LNCS Vol. 1592, pp. 206-222, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 206-222
-
-
Kipnis, A.1
Patarin, J.2
Goubin, L.3
-
12
-
-
84974622583
-
New Public-Key Cryptosystem Using Braid Groups
-
Advances in Cryptology, CRYPTO 2001
-
K.H. Ko, S.J. Lee, J.H. Cheon, J.W. Han, J. Kang C. Park, "New Public-Key Cryptosystem Using Braid Groups", in Advances in Cryptology, CRYPTO 2001, LNCS, Vol. 1880, pp. 166-184, 2001.
-
(2001)
LNCS
, vol.1880
, pp. 166-184
-
-
Ko, K.H.1
Lee, S.J.2
Cheon, J.H.3
Han, J.W.4
Kang, J.5
Park, C.6
-
13
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems", in Mathematics of Computation 48, 1987, pp. 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
14
-
-
26444502993
-
-
Maced. Acad. of Sci. and Arts, Sc. Math. Tech. Scien. XX 1-2, pp
-
S. Markovski, D. Gligoroski, V. Bakeva, "Quasigroup String Processing: Part 1", Maced. Acad. of Sci. and Arts, Sc. Math. Tech. Scien. XX 1-2, pp. 13-28, 1999.
-
(1999)
Quasigroup String Processing: Part 1
, pp. 13-28
-
-
Markovski, S.1
Gligoroski, D.2
Bakeva, V.3
-
15
-
-
0002448405
-
A Public-key cryptosystem based on algebraic coding theory
-
Jet Propulsion Laboratory, Pasadena, CA
-
R.J. McEliece, "A Public-key cryptosystem based on algebraic coding theory", DSN Progress Report, Jet Propulsion Laboratory, Pasadena, CA, 1978, pp. 114-116.
-
(1978)
DSN Progress Report
, pp. 114-116
-
-
McEliece, R.J.1
-
16
-
-
0000838441
-
Use of elliptic curves in cryptography
-
V Miller, "Use of elliptic curves in cryptography", in CRYPTO 85, 1985.
-
(1985)
CRYPTO 85
-
-
Miller, V.1
-
17
-
-
84947932132
-
Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of asymmetric algorithms
-
Advances in Cryptology, EUROCRYPT 1996
-
J. Patarin, "Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms", in Advances in Cryptology, EUROCRYPT 1996, LNCS Vol. 1070, pp. 33-48, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 33-48
-
-
Patarin, J.1
-
18
-
-
62349129394
-
Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of asymmetric algorithms - EXTENDED VERSION OF THE EUROCRYPT 1996 paper
-
J. Patarin, "Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms - EXTENDED VERSION OF THE EUROCRYPT 1996 paper". Available from the author.
-
Available from the author
-
-
Patarin, J.1
-
19
-
-
0003614758
-
Digital Signatures and Public-Key Functions as Intractable as Factorization
-
Technical Report MIT/LCS/TR-212, M.I.T, 1978
-
M.O. Rabin, "Digital Signatures and Public-Key Functions as Intractable as Factorization", Technical Report MIT/LCS/TR-212, M.I.T., 1978.
-
-
-
Rabin, M.O.1
-
20
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
-
R. Rivest, A. Shamir and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems", Comm. ACM, Vol. 21, No 2, 1978, pp. 120-126.
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
21
-
-
85006080539
-
Efficient signature schemes based on birational permutations
-
Advances in Cryptology, CRYPTO 1993
-
A. Shamir, "Efficient signature schemes based on birational permutations", in Advances in Cryptology, CRYPTO 1993, LNCS, Vol. 773, pp. 1-12, 1993.
-
(1993)
LNCS
, vol.773
, pp. 1-12
-
-
Shamir, A.1
|