Public-Key Cryptography

@inproceedings{Salomaa1996PublicKeyC,
  title={Public-Key Cryptography},
  author={Arto Salomaa},
  booktitle={Texts in Theoretical Computer Science. An EATCS Series},
  year={1996}
}
  • A. Salomaa
  • Published in
    Texts in Theoretical Computer…
    1996
  • Computer Science, Mathematics
Public Key Cryptography Unlike symmetric key cryptography, we do not find historical use of public-key cryptography. It is a relatively new concept. Symmetric cryptography was well suited for organizations such as governments, military, and big financial corporations were involved in the classified communication. With the spread of more unsecure computer networks in last few decades, a genuine need was felt to use cryptography at larger scale. The symmetric key was found to be non-practical due… 
A New Symmetric Key Encryption Algorithm Based on Jumbling Binary Sequence of Message
TLDR
This paper is introducing a new symmetric key encryption algorithm that involves three steps decoding to obtain final encrypted data.
Public Key Cryptography with a Group of Unknown Order
TLDR
Algorithms for digital signature generation and verification using public key cryptography over an arbitrary group G, similar to those of ElGamal, but do not require a knowledge of the group order.
Teaching Public-Key Cryptography in School
TLDR
This work deals with the question of how to teach young students the main concepts, issues, and solutions of public-key systems without being forced to also teach rather complicated theorems of number theory beforehand.
Dual Encryption by Random Segmentation and Random Re-Arrangement (RSRA) using Two Dimensional Array
TLDR
This paper proposes a new encryption technique with the help of random segmentation and random re-arrangement of cipher text using two dimensional array before transmission over communication channel so that the transmitted cipher text is more complex to decrypt by any attacker.
Time-Based Proxy Re-Encryption for User Revocation with Reduced UAKs in Cloud Storage
TLDR
Time-based Proxy ReEncryption (PRE) scheme efficiently handles user revocation by re-encrypting the cipher text again at proxy server.
Review of primality testing and integer factorization in public key cryptography by Song Y. Yan
TLDR
Although public key cryptography was discovered in the 1970s, it did not percolate through the mathematical community until much later, and it had some interesting side effects in mathematics.
A Survey of Key Management in Mobile Ad Hoc Networks
TLDR
This article presents a survey of the research work on key management in MANETs according to recent literature and proposes a number of key management schemes for MANET security.
A new Cryptosystem based on Formal Language Theory
TLDR
A classical cryptos system and a public-key cryptosystem are proposed, based on the passing from a string of production labels to the string generated by the grammar by a (leftmost) derivation with that given control word (thus obtaining the cyphertext).
Mental poker game based on a bit commitment scheme through network
Counting Functions to Generate The Primes in the RSA Algorithm and Diffie-Hellman Key Exchange
TLDR
New construction of the RSA algorithm and DH key exchange is given using the primes p,q from areal number x using some arithmetical function.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 201 REFERENCES
The first ten years of public-key cryptography
TLDR
The discussion covers exponential key exchange, the trap-door knapsack public-key cryptosystem, the Rivest-Shamir-Adleman (RSA) system, and the breaking of theknapsack cryptos system.
Multiuser cryptographic techniques
TLDR
It is shown how such a public key cryptosystem would allow the development of an authentication system which generates an unforgeable, message dependent digital signature.
Public key vs. conventional key encryption*
  • C. Kline, G. Popek
  • Computer Science
    1979 International Workshop on Managing Requirements Knowledge (MARK)
  • 1979
TLDR
An innovative approach to encryption, called public key algorithms, has recently been proposed as a way to address many of the key distribution and other problems which are present in conventional algorithm-based approaches.
Algorithms for Public Key Cryptosystems: Theory and Application
Symmetric and Asymmetric Encryption
TLDR
This paper opens with a brmf dmcussion of encryptmn principles and then proceeds to a comprehensive discussion of the asymmetric encryptmn/decryp tion channel and its application m secure communmations.
Relativized cryptography
  • G. Brassard
  • Computer Science, Mathematics
    20th Annual Symposium on Foundations of Computer Science (sfcs 1979)
  • 1979
TLDR
The main result presented here is the existence of a relativized model of computation under which there exists a provably secure transientkey cryptosystem.
Digital signatures: A tutorial survey
TLDR
This article on digital signature schemes is a survey of work done in the area since the concept was introduced in 1976.
An introduction to contemporary cryptology
TLDR
An appraisal is given of the current status of cryptologic research and the principal concepts of both secret-key and public-key cryptography are described.
On the security of public key protocols
  • D. Dolev, A. Yao
  • Computer Science
    22nd Annual Symposium on Foundations of Computer Science (sfcs 1981)
  • 1981
TLDR
Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
A modification of the RSA public-key encryption procedure (Corresp.)
  • H. C. Williams
  • Computer Science, Mathematics
    IEEE Trans. Inf. Theory
  • 1980
TLDR
For this modified version of the RSA scheme, it is shown that, if the encryption procedure can be broken in a certain number of operations, then R can be factored in only a few more operations.
...
1
2
3
4
5
...