Skip to search formSkip to main content

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

2015

2015

A pseudorandom function (PRF) is a keyed function \(F : {\mathcal K}\times{\mathcal X}\rightarrow{\mathcal Y}\) where, for a… Expand

Is this relevant?

Highly Cited

2010

Highly Cited

2010

We construct a simple fully homomorphic encryption scheme, using only elementary modular arithmetic. We use Gentry’s technique to… Expand

Is this relevant?

2009

2009

Since the first feasible collision differential was given for MD5 in 2004 by Wang et al, a lot of work has been concentrated on… Expand

Is this relevant?

Highly Cited

2006

Highly Cited

2006

In recent years, a large number of identity- based key agreement protocols from pairings have been proposed. Some of them are… Expand

Is this relevant?

2006

2006

Significant progress in the design of special purpose hardware for supporting the Number Field Sieve (NFS) has been made. From a… Expand

Is this relevant?

Highly Cited

2005

Highly Cited

2005

In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the… Expand

Is this relevant?

2004

2004

Abstract
We present an algorithm to compute the zeta function of an arbitrary
hyperelliptic curve over a finite field Fq of… Expand

Is this relevant?

Highly Cited

2003

Highly Cited

2003

In this paper we introduce NTRUSIGN, a new family of signature schemes based on solving the approximate closest vector problem… Expand

Is this relevant?

Highly Cited

2002

Highly Cited

2002

A new variety of miniature carnation characterized by its rapid and continuous production of small red-purple blooms with a… Expand

Is this relevant?

Highly Cited

2002

Highly Cited

2002

We introduce the concept of hierarchical identity-based encryption (HIBE) schemes, give precise definitions of their security and… Expand

Is this relevant?