Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,123,965 papers from all fields of science
Search
Sign In
Create Free Account
Public-key cryptography
Known as:
Private key encryption
, Secret-key
, Private key
Expand
Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys that may be disseminated widely…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ACM Turing Award
Authentication
Certificate authority
Certificate policy
Expand
Broader (1)
Public key infrastructure
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2007
2007
Public-Key Cryptography on the Top of a Needle
L. Batina
,
N. Mentens
,
K. Sakiyama
,
B. Preneel
,
I. Verbauwhede
IEEE International Symposium on Circuits and…
2007
Corpus ID: 2212869
This work describes the smallest known hardware implementation for elliptic/hyperelliptic curve cryptography (ECC/HECC). We…
Expand
Highly Cited
2006
Highly Cited
2006
Discount Anonymous On Demand Routing for Mobile Ad hoc Networks
Liu Yang
,
M. Jakobsson
,
S. Wetzel
Securecomm and Workshops
2006
Corpus ID: 6454169
Recent years have seen a large number of proposals for anonymity mechanisms operating on the application layer. Given that…
Expand
Review
2006
Review
2006
A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS Version 1 . 1 June 2 , 2006
Emanuel Fonseca
,
Andreas Festag
2006
Corpus ID: 2198668
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide…
Expand
Highly Cited
2005
Highly Cited
2005
Revisiting Public-Key Cryptography for Wireless Sensor Networks
B. Arazi
,
I. Elhanany
,
O. Arazi
,
H. Qi
Computer
2005
Corpus ID: 10396652
The lack of a fixed infrastructure and the ad hoc nature of wireless sensor networks deployments suggest that the ability to…
Expand
Highly Cited
2005
Highly Cited
2005
H.264/AVC video authentication using skipped macroblocks for an erasable watermark
Dima Pröfrock
,
H. Richter
,
M. Schlauweg
,
E. Müller
Visual Communications and Image Processing
2005
Corpus ID: 15826220
This paper presents a new watermarking framework, suitable for authentication of H.264 compressed videos. The authentication data…
Expand
Review
2003
Review
2003
Public-key cryptography extensions into Kerberos
I. Downnard
2003
Corpus ID: 62625502
How can and why should the Kerberos authentication standard (RFC1510) be extended to support public-key cryptography? These are…
Expand
Highly Cited
2001
Highly Cited
2001
An adaptive grid non-parametric approach to pharmacokinetic and dynamic (PK/PD) population models
R. Leary
,
R. Jelliffe
,
A. Schumitzky
,
M. Guilder
Proceedings 14th IEEE Symposium on Computer-Based…
2001
Corpus ID: 18929107
Our NPEM (Non-Parametric Expectation Maximization) software for non-parametric PK/PD (pharmacokinetic/pharmacodynamic) population…
Expand
1996
1996
Public key cryptography
S. Garfinkel
1996
Corpus ID: 62619295
The RSA algorithm can be used for a kind of unforgeable digital signature. In this application, the secret key is used to encrypt…
Expand
Highly Cited
1985
Highly Cited
1985
Encryption and Error-Correction Coding Using D Sequences
S. Kak
IEEE transactions on computers
1985
Corpus ID: 15563558
This paper presents several new properties of D sequences that have applications to encryption and error coding. It also…
Expand
Highly Cited
1984
Highly Cited
1984
Contributions to the theory of PK induction from sitter-group work.
K. J. Batcheldor
1984
Corpus ID: 148297928
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required