# Public-key cryptography

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

Highly Cited

2012

Highly Cited

2012

- 2012

Follow up what we will offer in this article about mathematics of public key cryptography. You know really that this book isâ€¦Â (More)

Is this relevant?

Highly Cited

2008

Highly Cited

2008

- STOC
- 2008

This paper attempts to broaden the foundations of public-key cryptography. We construct new public-key encryption schemes basedâ€¦Â (More)

Is this relevant?

Highly Cited

2007

Highly Cited

2007

- Fifth Annual IEEE International Conference onâ€¦
- 2007

RFID-tags are a new generation of bar-codes with added functionality. An emerging application is the use of RFID-tags for antiâ€¦Â (More)

Is this relevant?

Highly Cited

2004

Highly Cited

2004

- Applicable Algebra in Engineering, Communicationâ€¦
- 2004

After some excitement generated by recently suggested public key exchange protocols due to Anshelâ€“Anshelâ€“Goldfeld and Koâ€“Lee etâ€¦Â (More)

Is this relevant?

Highly Cited

2004

Highly Cited

2004

- ESAS
- 2004

The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitableâ€¦Â (More)

Is this relevant?

Highly Cited

1999

Highly Cited

1999

- 1999

Algebraic key establishment protocols based on the difficulty of solving equations over algebraic structures are described as aâ€¦Â (More)

Is this relevant?

Highly Cited

1999

Highly Cited

1999

- EUROCRYPT
- 1999

This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications toâ€¦Â (More)

Is this relevant?

Highly Cited

1991

Highly Cited

1991

- EUROCRYPT
- 1991

An identity-based non-interactive public key distribution system is presented that is based on a novel trapdoor one-way functionâ€¦Â (More)

Is this relevant?

Highly Cited

1981

Highly Cited

1981

- 22nd Annual Symposium on Foundations of Computerâ€¦
- 1981

Recently the use of public key encryption to provide secure network communication has received considerable attention. Suchâ€¦Â (More)

Is this relevant?

Highly Cited

1978

Highly Cited

1978

- Commun. ACM
- 1978

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal theâ€¦Â (More)

Is this relevant?