A MODIFICATION OF THE RSA PUBLIC-KEY ENCRYPTION PROCEDURE

被引:142
|
作者
WILLIAMS, HC
机构
关键词
D O I
10.1109/TIT.1980.1056264
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:726 / 729
页数:4
相关论文
共 50 条
  • [31] A SEMANTICALLY SECURE PUBLIC-KEY CRYPTOSYSTEM BASED ON RSA
    Romankov, V. A.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2015, 29 (03): : 32 - 40
  • [32] AN RSA BASED PUBLIC-KEY CRYPTOSYSTEM FOR SECURE COMMUNICATION
    VENKAIAH, VCH
    [J]. PROCEEDINGS OF THE INDIAN ACADEMY OF SCIENCES-MATHEMATICAL SCIENCES, 1992, 102 (02): : 147 - 153
  • [33] An efficient RSA public key encryption scheme
    Aboud, Sattar J.
    AL-Fayoumi, Mohammad A.
    Al-Fayoumi, Mustafa
    Jabbar, Haidar S.
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 127 - +
  • [34] Bi-Deniable Public-Key Encryption
    O'Neill, Adam
    Peikert, Chris
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 525 - 542
  • [35] Public-Key Encryption with Integrated Keyword Search
    Vishal Saraswat
    Rajeev Anand Sahu
    Gaurav Sharma
    Veronika Kuchta
    Olivier Markowitch
    [J]. Journal of Hardware and Systems Security, 2019, 3 (1) : 12 - 25
  • [36] Action-triggered public-key system for GSM using RSA with phone-dependent encryption
    El Nemr, Rehab K.
    Ismail, Imane Aly Saroit
    Ahmed, S. H.
    [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 175 - +
  • [37] A teaching module on the history of public-key cryptography and RSA
    Jankvist, Uffe Thomas
    [J]. BSHM BULLETIN-JOURNAL OF THE BRITISH SOCIETY FOR THE HISTORY OF MATHEMATICS, 2008, 23 (03): : 157 - 168
  • [38] FPGA implementation of RSA public-key cryptographic coprocessor
    Hani, MK
    Lin, TS
    Shaikh-Husin, N
    [J]. IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : B6 - B11
  • [39] FAST DECIPHERMENT ALGORITHM FOR RSA PUBLIC-KEY CRYPTOSYSTEM
    QUISQUATER, JJ
    COUVREUR, C
    [J]. ELECTRONICS LETTERS, 1982, 18 (21) : 905 - 907
  • [40] Deniable Encryption Protocols Based on Probabilistic Public-Key Encryption
    Moldovyan, Nikolay
    Berezin, Andrey
    Kornienko, Anatoly
    Moldovyan, Alexander
    [J]. PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 284 - 289