Semantic Scholar uses AI to extract papers important to this topic.
Preface I. Introduction and Classical Cryptography Introduction Cryptography and Modern Cryptography The Setting of Private-Key… Expand In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit… Expand We present the first known implementation of elliptic curve cryptography over F/sub 2p/ for sensor networks based on the 8-bit, 7… Expand This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of… Expand II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical… Expand This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to… Expand First, we introduce the notion of divertibility as a protocol property as opposed to the existing notion as a language property… Expand Foreword. Preface. 1. Introduction to Public Key Cryptography. 2. Introduction to Elliptic Curves. 3. Isomorphism Classes of… Expand New Cryptographic protocols which take full advantage of the unique properties of public key cryptosystems are now evolving… Expand Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key… Expand