-
1
An efficient method to generate elliptic curves
Published 2001-01-01Subjects: “…public key cryptosystem;elliptic curve generation…”
Get full text
Article -
2
AN IDEA FOR KNAPSACK CRYPTOSYSTEM BACKDOOR
Published 2025-07-01Subjects: “…public key cryptosystem, key generation, algorithmic attack, subliminal channel, kleptography.…”
Get full text
Article -
3
Improvements on results of representation of elements in cyclotomic subgroup
Published 2007-01-01Subjects: “…public-key cryptosystem…”
Get full text
Article -
4
Proxy re-signature scheme based on isomorphisms of polynomial
Published 2017-02-01Subjects: “…proxy re-signature;multivariate public key cryptosystem;isomorphisms of polynomial;affine transformation…”
Get full text
Article -
5
Secure Lattice-Based Signature Scheme for Internet of Things Applications
Published 2025-01-01Subjects: “…Certificateless public key cryptosystem…”
Get full text
Article -
6
A New Approach Combining RSA and ElGamal Algorithms: Advancements in Encryption and Digital Signatures Using Gaussian Integers
Published 2025-03-01Subjects: “…combined rsa-elgamal public-key cryptosystem…”
Get full text
Article -
7
Further research on public-key cryptosystems based on third-order recurrence sequence
Published 2005-01-01Subjects: “…public-key cryptosystem;third-order linear recurrence sequence;(trapdoor) discrete logarithm;integer factorization…”
Get full text
Article -
8
Improvement on the XTP public key cryptosystem and communication protocol of provable security
Published 2007-01-01Subjects: “…public key cryptosystem;XTR;trace function;provable security;communication protocol;one-time-pad…”
Get full text
Article -
9
Improvement on the XTP public key cryptosystem and communication protocol of provable security
Published 2007-01-01Subjects: “…public key cryptosystem…”
Get full text
Article -
10
The quantum circuit implementation and feasibility analysis of quantum public-key cryptosystem based on the $$QSCD_{ff}$$ Q S C D ff problem
Published 2024-12-01Subjects: Get full text
Article -
11
Verifiable multi-secret sharing schemes applicable to arbitrary access structures
Published 2007-01-01Subjects: Get full text
Article -
12
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications
Published 2025-07-01Subjects: Get full text
Article -
13
Geometric realization of electronic elections based on threshold secret sharing
Published 2018-07-01Subjects: Get full text
Article -
14
Review of Modular Multiplication Algorithms over Prime Fields for Public-Key Cryptosystems
Published 2025-06-01Subjects: “…public-key cryptosystems…”
Get full text
Article -
15
A Comprehensive Review of MI-HFE and IPHFE Cryptosystems: Advances in Internal Perturbations for Post-Quantum Security
Published 2024-10-01Subjects: “…multivariate public key cryptosystems…”
Get full text
Article