Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,385,169 papers from all fields of science
Search
Sign In
Create Free Account
Cryptosystem
Known as:
Crypto system
, Cryptographic system
, Cryptosystems
In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
45 relations
Adversary (cryptography)
Algorithm
Arjen Lenstra
Backdoor (computing)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Proposed Random Unified Chaotic Map as PRBG for Voice Encryption in Wireless Communication
S. Sadkhan
,
R. S. Mohammed
2015
Corpus ID: 60672007
2009
2009
Efficient migration for mobile computing in distributed networks
Kuo-Hsuan Huang
,
Y. Chung
,
Chia-Hui Liu
,
F. Lai
,
Tzer-Shyong Chen
Comput. Stand. Interfaces
2009
Corpus ID: 13174262
Highly Cited
2008
Highly Cited
2008
An efficient threshold verifiable multi-secret sharing
M. H. Dehkordi
,
S. Mashhadi
Comput. Stand. Interfaces
2008
Corpus ID: 16154127
Highly Cited
2007
Highly Cited
2007
Improving the security of 'a flexible biometrics remote user authentication scheme'
M. Khan
,
Jiashu Zhang
Comput. Stand. Interfaces
2007
Corpus ID: 33160431
Highly Cited
2007
Highly Cited
2007
A Direct Anonymous Attestation Scheme for Embedded Devices
H. Ge
,
S. Tate
International Conference on Theory and Practice…
2007
Corpus ID: 15100983
Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its…
Expand
Review
2006
Review
2006
A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006
Emanuel Fonseca
,
Andreas Festag
2006
Corpus ID: 2198668
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide…
Expand
Highly Cited
2004
Highly Cited
2004
Efficient password authenticated key agreement using smart cards
Wen-Shenq Juang
Computers & security
2004
Corpus ID: 11579889
Highly Cited
2004
Highly Cited
2004
A threshold signature scheme for group communications without a shared distribution center
T. Chang
,
Chou-Chen Yang
,
M. Hwang
Future generations computer systems
2004
Corpus ID: 10334552
Highly Cited
2001
Highly Cited
2001
Building Certification Paths: Forward vs. Reverse
Yassir Elley
,
A. Anderson
,
S. Hanna
,
Sean Mullan
,
R. Perlman
,
Seth Proctor
2001
Corpus ID: 17585920
In general, building and validating a certification path connecting a trust anchor to a target can be a very time-consuming…
Expand
Highly Cited
1998
Highly Cited
1998
An on-line secret sharing scheme for multi-secrets
Ren-Junn Hwang
,
Chinchen Chang
Computer Communications
1998
Corpus ID: 12599477
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE