Skip to search formSkip to main contentSkip to account menu

Cryptosystem

Known as: Crypto system, Cryptographic system, Cryptosystems 
In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2004
Highly Cited
2004
The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was… 
Highly Cited
1999
Highly Cited
1999
  • Pascal Paillier
  • International Conference on the Theory and…
  • 1999
  • Corpus ID: 9483611
This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to… 
Highly Cited
1998
Highly Cited
1998
We describe NTRU, a new public key cryptosystem. NTRU features reasonably short, easily created keys, high speed, and low memory… 
Highly Cited
1998
Highly Cited
1998
This paper proposes a novel public-key cryptosystem, which is practical, provably secure and has some other interesting… 
Highly Cited
1997
Highly Cited
1997
We present a probabilistic public key cryptosystem which is secure unless the worst case of the following lattice problem can be… 
Highly Cited
1987
Highly Cited
1987
We discuss analogs based on elliptic curves over finite fields of public key cryptosystems which use the multiplicative group of… 
Highly Cited
1984
Highly Cited
1984
  • Taher El Gamal
  • IEEE Transactions on Information Theory
  • 1984
  • Corpus ID: 2973271
-A new signature scheme is proposed, together with an imple- mentation of the Diffie-Hellman key distribution scheme that… 
Highly Cited
1984
Highly Cited
1984
  • A. Shamir
  • Annual International Cryptology Conference
  • 1984
  • Corpus ID: 1402295
In this paper we introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to… 
Highly Cited
1983
Highly Cited
1983
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… 
Highly Cited
1978
Highly Cited
1978
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the…