Skip to search formSkip to main contentSkip to account menu

Public-key cryptography

Known as: Private key encryption, Secret-key, Private key 
Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys that may be disseminated widely… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2007
2007
This work describes the smallest known hardware implementation for elliptic/hyperelliptic curve cryptography (ECC/HECC). We… 
Highly Cited
2006
Highly Cited
2006
Recent years have seen a large number of proposals for anonymity mechanisms operating on the application layer. Given that… 
Review
2006
Review
2006
Vehicular ad hoc networks (VANETs) are the technical basis of an envisioned Intelligent transportation system. They offer a wide… 
Highly Cited
2005
Highly Cited
2005
The lack of a fixed infrastructure and the ad hoc nature of wireless sensor networks deployments suggest that the ability to… 
Highly Cited
2005
Highly Cited
2005
This paper presents a new watermarking framework, suitable for authentication of H.264 compressed videos. The authentication data… 
Review
2003
Review
2003
How can and why should the Kerberos authentication standard (RFC1510) be extended to support public-key cryptography? These are… 
Highly Cited
2001
Highly Cited
2001
Our NPEM (Non-Parametric Expectation Maximization) software for non-parametric PK/PD (pharmacokinetic/pharmacodynamic) population… 
1996
1996
The RSA algorithm can be used for a kind of unforgeable digital signature. In this application, the secret key is used to encrypt… 
Highly Cited
1985
Highly Cited
1985
This paper presents several new properties of D sequences that have applications to encryption and error coding. It also… 
Highly Cited
1984