Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Public-key cryptography

Known as: Private key encryption, Secret-key, Private key 
Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys that may be disseminated widely… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2007
Review
2007
Preface I. Introduction and Classical Cryptography Introduction Cryptography and Modern Cryptography The Setting of Private-Key… Expand
Highly Cited
2005
Highly Cited
2005
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Highly Cited
2004
Highly Cited
2004
We present the first known implementation of elliptic curve cryptography over F/sub 2p/ for sensor networks based on the 8-bit, 7… Expand
  • table I
  • figure 1
  • table II
  • table III
  • figure 2
Highly Cited
2003
Highly Cited
2003
This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of… Expand
Highly Cited
2001
Highly Cited
2001
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1999
Highly Cited
1999
This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to… Expand
Highly Cited
1998
Highly Cited
1998
First, we introduce the notion of divertibility as a protocol property as opposed to the existing notion as a language property… Expand
  • figure 1
Highly Cited
1997
Highly Cited
1997
  • A. Menezes
  • The Kluwer international series in engineering…
  • 1997
  • Corpus ID: 123104719
Foreword. Preface. 1. Introduction to Public Key Cryptography. 2. Introduction to Elliptic Curves. 3. Isomorphism Classes of… Expand
Highly Cited
1980
Highly Cited
1980
  • R. Merkle
  • IEEE Symposium on Security and Privacy
  • 1980
  • Corpus ID: 206578431
New Cryptographic protocols which take full advantage of the unique properties of public key cryptosystems are now evolving… Expand
  • figure I
Highly Cited
1979
Highly Cited
1979
  • G. Blakley
  • International Workshop on Managing Requirements…
  • 1979
  • Corpus ID: 201812983
Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key… Expand