Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,623,575 papers from all fields of science
Search
Sign In
Create Free Account
Public-key cryptography
Known as:
Private key encryption
, Secret-key
, Private key
Expand
Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys that may be disseminated widely…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ACM Turing Award
Authentication
Certificate authority
Certificate policy
Expand
Broader (1)
Public key infrastructure
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2006
Review
2006
A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006
Emanuel Fonseca
,
Andreas Festag
2006
Corpus ID: 2198668
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide…
Expand
Highly Cited
2005
Highly Cited
2005
Revisiting Public-Key Cryptography for Wireless Sensor Networks
B. Arazi
,
I. Elhanany
,
O. Arazi
,
H. Qi
Computer
2005
Corpus ID: 10396652
The lack of a fixed infrastructure and the ad hoc nature of wireless sensor networks deployments suggest that the ability to…
Expand
2005
2005
RSA & Public Key Cryptography in FPGAs
M. Langhammer
2005
Corpus ID: 1834720
In this paper an RSA calculation architecture is proposed for FPGAs that addresses the issues of scalability, flexible…
Expand
Highly Cited
2005
Highly Cited
2005
H.264/AVC video authentication using skipped macroblocks for an erasable watermark
Dima Pröfrock
,
H. Richter
,
M. Schlauweg
,
E. Müller
Visual Communications and Image Processing
2005
Corpus ID: 15826220
This paper presents a new watermarking framework, suitable for authentication of H.264 compressed videos. The authentication data…
Expand
Review
2003
Review
2003
Public-key cryptography extensions into Kerberos
I. Downnard
2003
Corpus ID: 62625502
How can and why should the Kerberos authentication standard (RFC1510) be extended to support public-key cryptography? These are…
Expand
Highly Cited
2001
Highly Cited
2001
An adaptive grid non-parametric approach to pharmacokinetic and dynamic (PK/PD) population models
R. Leary
,
R. Jelliffe
,
A. Schumitzky
,
M. Guilder
Proceedings 14th IEEE Symposium on Computer-Based…
2001
Corpus ID: 18929107
Our NPEM (Non-Parametric Expectation Maximization) software for non-parametric PK/PD (pharmacokinetic/pharmacodynamic) population…
Expand
Highly Cited
2000
Highly Cited
2000
Algebraic synthesis of efficient deadlock avoidance policies for sequential resource allocation systems
Jonghun Park
,
S. Reveliotis
IEEE Trans. Robotics Autom.
2000
Corpus ID: 15419658
Deadlock avoidance in sequential resource allocation systems is a well-defined problem in discrete event system literature, as it…
Expand
1996
1996
Public key cryptography
S. Garfinkel
1996
Corpus ID: 62619295
The RSA algorithm can be used for a kind of unforgeable digital signature. In this application, the secret key is used to encrypt…
Expand
Highly Cited
1985
Highly Cited
1985
Encryption and Error-Correction Coding Using D Sequences
S. Kak
IEEE transactions on computers
1985
Corpus ID: 15563558
This paper presents several new properties of D sequences that have applications to encryption and error coding. It also…
Expand
Highly Cited
1984
Highly Cited
1984
Contributions to the theory of PK induction from sitter-group work.
K. J. Batcheldor
1984
Corpus ID: 148297928
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE