Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

PKCS

Known as: Public-Key Cryptography Standards, PKCS7, PKCS10 
In cryptography, PKCS stands for "Public Key Cryptography Standards". These are a group of public-key cryptography standards devised and published by… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
This document provides recommendations for the implementation of password-based cryptography, covering key derivation functions… Expand
Is this relevant?
Highly Cited
2016
Highly Cited
2016
This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
The identity (ID)-based public-key system using bilinear pairings defined on elliptic curves offers a flexible approach to… Expand
Is this relevant?
2003
2003
We describe an efficient combination of two variants of the RSA cryptosystem (MPrime and Rebalanced RSA) analyzed by Boneh and… Expand
  • table 1
  • table 1
Is this relevant?
2003
2003
alert arguments Array blur Boolean Boolean break byte cal lee caller captureEvents case catch char class clearInterval… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
This memo represents a republication of PKCS #5 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and… Expand
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This document describes the Cryptographic Message Syntax. This syntax is used to digitally sign, digest, authenticate, or encrypt… Expand
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This paper introduces a new adaptive chosen ciphertext attack against certain protocols based on RSA. We show that an RSA private… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This document describes a method for encrypting data using the RSA public-key cryptosystem. This memo provides information for… Expand
Is this relevant?
Highly Cited
1983
Highly Cited
1983
We define a p-party ping-pong protocol and its security problem, along the lines of Dolev and Yao's definition for twoparty ping… Expand
Is this relevant?