Public-key cryptography

Known as: Private key encryption, Secret-key, Private key 
Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys that may be disseminated widely… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Follow up what we will offer in this article about mathematics of public key cryptography. You know really that this book is… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
This paper attempts to broaden the foundations of public-key cryptography. We construct new public-key encryption schemes based… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
RFID-tags are a new generation of bar-codes with added functionality. An emerging application is the use of RFID-tags for anti… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
After some excitement generated by recently suggested public key exchange protocols due to Anshel–Anshel–Goldfeld and Ko–Lee et… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Algebraic key establishment protocols based on the difficulty of solving equations over algebraic structures are described as a… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to… (More)
Is this relevant?
Highly Cited
1991
Highly Cited
1991
An identity-based non-interactive public key distribution system is presented that is based on a novel trapdoor one-way function… (More)
Is this relevant?
Highly Cited
1981
Highly Cited
1981
Recently the use of public key encryption to provide secure network communication has received considerable attention. Such… (More)
Is this relevant?
Highly Cited
1978
Highly Cited
1978
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… (More)
Is this relevant?