Skip to search formSkip to main contentSkip to account menu

Public-key cryptography

Known as: Private key encryption, Secret-key, Private key 
Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys that may be disseminated widely… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2006
Review
2006
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide… 
Highly Cited
2005
Highly Cited
2005
The lack of a fixed infrastructure and the ad hoc nature of wireless sensor networks deployments suggest that the ability to… 
2005
2005
In this paper an RSA calculation architecture is proposed for FPGAs that addresses the issues of scalability, flexible… 
Highly Cited
2005
Highly Cited
2005
This paper presents a new watermarking framework, suitable for authentication of H.264 compressed videos. The authentication data… 
Review
2003
Review
2003
How can and why should the Kerberos authentication standard (RFC1510) be extended to support public-key cryptography? These are… 
Highly Cited
2001
Highly Cited
2001
Our NPEM (Non-Parametric Expectation Maximization) software for non-parametric PK/PD (pharmacokinetic/pharmacodynamic) population… 
Highly Cited
2000
Highly Cited
2000
Deadlock avoidance in sequential resource allocation systems is a well-defined problem in discrete event system literature, as it… 
1996
1996
The RSA algorithm can be used for a kind of unforgeable digital signature. In this application, the secret key is used to encrypt… 
Highly Cited
1985
Highly Cited
1985
This paper presents several new properties of D sequences that have applications to encryption and error coding. It also… 
Highly Cited
1984