Cryptosystem

Known as: Crypto system, Cryptographic system, Cryptosystems 
In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2008
Highly Cited
2008
We construct public-key cryptosystems that are secure assuming theworst-case hardness of approximating the minimum distance on n… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In traditional cryptosystems, user authentication is based on possession of secret keys; the method falls apart if the keys are… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
The braid groups are infinite non-commutative groups naturally arising from geometric braids. The aim of this article is twofold… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosystems required to initialize the… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
We describe NTRU, a new public key cryptosystem. NTRU features reasonably short, easily created keys, high speed, and low memory… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
We present a probabilistic public key cryptosystem which is secure unless the worst case of the following lattice problem can be… (More)
Is this relevant?
Highly Cited
1990
Highly Cited
1990
We show how to construct a public-key cryptosystem (as originally defined by Diffie and Hellman) secure against chosen ciphertext… (More)
Is this relevant?
Highly Cited
1984
Highly Cited
1984
I n t h i s p a p e r w e i n t r o d u c e a novel t y p e of c r y p t o g r a p h i c scheme, which e n a b l e s any p a i r… (More)
  • figure 2
Is this relevant?
Highly Cited
1978
Highly Cited
1978
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… (More)
Is this relevant?