Skip to search formSkip to main content

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

Highly Cited

1999

Highly Cited

1999

This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to… Expand

Is this relevant?

Highly Cited

1998

Highly Cited

1998

We describe NTRU, a new public key cryptosystem. NTRU features reasonably short, easily created keys, high speed, and low memory… Expand

Is this relevant?

Highly Cited

1998

Highly Cited

1998

This paper proposes a novel public-key cryptosystem, which is practical, provably secure and has some other interesting… Expand

Is this relevant?

Highly Cited

1997

Highly Cited

1997

We present a probabilistic public key cryptosystem which is secure unless the worst case of the following lattice problem can be… Expand

Is this relevant?

Highly Cited

1987

Highly Cited

1987

We discuss analogs based on elliptic curves over finite fields of public key cryptosystems which use the multiplicative group of… Expand

Is this relevant?

Highly Cited

1985

Highly Cited

1985

A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a… Expand

Is this relevant?

Highly Cited

1985

Highly Cited

1985

A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a… Expand

Is this relevant?

Highly Cited

1984

Highly Cited

1984

In this paper we introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to… Expand

Is this relevant?

Highly Cited

1983

Highly Cited

1983

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… Expand

Is this relevant?

Highly Cited

1978

Highly Cited

1978

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… Expand

Is this relevant?