ABSTRACT
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intented recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be “signed” using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in “electronic mail” and “electronic funds transfer” systems. A message is encrypted by representing it as a number M, raising M to a publicly specified power e, and then taking the remainder when the result is divided by the publicly specified product, n, of two large secret primer numbers p and q. Decryption is similar; only a different, secret, power d is used, where e * d ≡ 1(mod (p - 1) * (q - 1)). The security of the system rests in part on the difficulty of factoring the published divisor, n.
REFERENCES
Note: OCR errors may be found in this Reference List extracted from the full text article. ACM has opted to expose the complete List rather than only correct and linked references.
|
1
|
Diffie, W., and Hellman, M. New directions in cryptography. IEEE Trans. Inform. Theory IT-22, 6 (Nov. 1976), 644-654.
|
|
2
|
Diffie, W., and Hellman, M. Exhaustive cryptanalysis of the NBS data encryption standard. Computer 10 (June 1977), 74-84.
|
|
3
|
|
|
4
|
Levine, J., and Brawley, J.V. Some cryptographic applications of permutation polynomials. Cryptologia 1 (Jan. 1977), 76-92.
|
 |
5
|
|
 |
6
|
|
|
7
|
Niven, I., and Zuckerman, H.S. An Introduction to the Theory of Numbers. Wiley, New York, 1972.
|
|
8
|
Pohlig, S.C., and Hellman, M.E. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. To appear in IEEE Trans. Inform. Theory, 1978.
|
|
9
|
Pollard, J.M. Theorems on factorization and primality testing. Proc. Camb. Phil. Soc. 76 (1974), 521-528.
|
|
10
|
Potter, R.J., Electronic mail. Science 195, 4283 (March 1977), 1160-1164.
|
|
11
|
Rabin, M.O., Probabilistic algorithms. In Algorithms and Complexity, J. F. Traub, Ed., Academic Press, New York, 1976, pp. 21-40.
|
|
12
|
Solovay, R., and Strassen, V. A Fast Monte-Carlo test for primality. SIAM J. Comptng. 6 (March 1977), 84-85.
|
|
13
|
Federal Register, Vol. 40, No. 52, March 17, 1975.
|
|
14
|
Federal Register, Vol. 40, No. 149, August 1, 1975.
|
CITED BY 675
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Daniel Mesquita , Jean-Denis Techer , Lionel Torres , Gilles Sassatelli , Gaston Cambon , Michel Robert , Fernando Moraes, Current mask generation: a transistor level security against DPA attacks, Proceedings of the 18th annual symposium on Integrated circuits and system design, September 04-07, 2005, Florianolpolis, Brazil
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Ronghua Lu , Jun Han , Xiaoyang Zeng , Qing Li , Lang Mai , Jia Zhao, A low-cost cryptographic processor for security embedded system, Proceedings of the 2008 conference on Asia and South Pacific design automation, January 21-24, 2008, Seoul, Korea
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Chingwei Yeh , En-Feng Hsu , Kai-Wen Cheng , Jinn-Shyan Wang , Nai-Jen Chang, An 830mW, 586kbps 1024-bit RSA chip design, Proceedings of the conference on Design, automation and test in Europe: Designers' forum, March 06-10, 2006, Munich, Germany
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Jose-Vicente Aguirre , Rafael Álvarez , Julia Sánchez , Antonio Zamora, Silence detection in secure P2P VoIP multiconferencing, Proceedings of the 5th WSEAS International Conference on Information Security and Privacy, p.11-14, November 20-22, 2006, Venice, Italy
|
|
|
|
|
|
|
|
|
|
|
|
Zekeriya Erkin , Alessandro Piva , Stefan Katzenbeisser , R. L. Lagendijk , Jamshid Shokrollahi , Gregory Neven , Mauro Barni, Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing, EURASIP Journal on Information Security, v.7 n.2, p.1-20, January 2007
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Mao-Yin Wang , Chih-Pin Su , Chih-Tsun Huang , Cheng-Wen Wu, An HMAC processor with integrated SHA-1 and MD5 algorithms, Proceedings of the 2004 conference on Asia South Pacific design automation: electronic design and solution fair, p.456-458, January 27-30, 2004, Yokohama, Japan
|
|
|
|
|
|
T. W. Arnold , A. Dames , M. D. Hocker , M. D. Marik , N. A. Pellicciotti , K. Werner, Cryptographic system enhancements for the IBM System z9, IBM Journal of Research and Development, v.51 n.1/2, p.87-102, January 2007
|
|
Helena Handschuh , David Naccache , Pascal Paillier , Christophe Tymen, Provably secure chipcard personalization, or, how to fool malicious insiders, Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference, p.5-5, November 21-22, 2002, San Jose, CA
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Suan Khai Chong , Graham Farr , Laura Frost , Simon Hawley, On pedagogically sound examples in public-key cryptography, Proceedings of the 29th Australasian Computer Science Conference, p.63-68, January 16-19, 2006, Hobart, Australia
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lein Harn , Hung-Yu Lin , Shoubao Yang, A software authentication system for the prevention of computer viruses, Proceedings of the 1992 ACM annual conference on Communications, p.447-450, March 03-05, 1992, Kansas City, Missouri, United States
|
|
|
|
|
|
|
|
|
|
Rosario Gennaro , Daniele Micciancio , Tal Rabin, An efficient non-interactive statistical zero-knowledge proof system for quasi-safe prime products, Proceedings of the 5th ACM conference on Computer and communications security, p.67-72, November 02-05, 1998, San Francisco, California, United States
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Helvio P. Peixoto , Margarida F. Jacome , Ander Royo , Juan C. Lopez, The design space layer: supporting early design space exploration for core-based designs, Proceedings of the conference on Design, automation and test in Europe, p.131-es, January 1999, Munich, Germany
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Paolo Bernardi , Filippo Gandino , Bartolomeo Montrucchio , Maurizio Rebaudengo , Erwing Ricardo Sanchez, Design of an UHF RFID transponder for secure authentication, Proceedings of the 17th great lakes symposium on Great lakes symposium on VLSI, March 11-13, 2007, Stresa-Lago Maggiore, Italy
|
|
|
|
|
|
Joseph Y. Halpern , Barbara Simons , Ray Strong , Danny Dolev, Fault-tolerant clock synchronization, Proceedings of the third annual ACM symposium on Principles of distributed computing, p.89-102, August 27-29, 1984, Vancouver, British Columbia, Canada
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Robert H. Deng , Yongfei Han , Albert B. Jeng , Teow-Hin Ngair, A new on-line cash check scheme, Proceedings of the 4th ACM conference on Computer and communications security, p.111-116, April 01-04, 1997, Zurich, Switzerland
|
|
|
|
|
|
Wolfgang Gräther , Wolfgang Prinz , Sabine Kolvenbach, Enhancing workflows by web technology, Proceedings of the international ACM SIGGROUP conference on Supporting group work: the integration challenge, p.271-280, November 16-19, 1997, Phoenix, Arizona, United States
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
J. Murai , H. Kusumoto , S. Yamaguchi , A. Kato, Construction of internet for Japanese academic communities, Proceedings of the 1989 ACM/IEEE conference on Supercomputing, p.737-746, November 12-17, 1989, Reno, Nevada, United States
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Jean-Sébastien Coron , David Naccache , Yvo Desmedt , Andrew Odlyzko , Julien P. Stern, Index Calculation Attacks on RSA Signature and Encryption, Designs, Codes and Cryptography, v.38 n.1, p.41-53, January 2006
|
|
|
|
H. W. Go , P. Y. Chan , Y. Dong , A. F. Sui , S. M. Yiu , Lucas C. K. Hui , Victor O. K. Li, Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs), Proceedings of the 43rd annual southeast regional conference, March 18-20, 2005, Kennesaw, Georgia
|
|
|
|
|
|
|
|
Thomas Y. C. Woo , Raghuram Bindignavle , Shaowen Su , Simon S. Lam, SNP: an interface for secure network programming, Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference, p.4-4, June 06-10, 1994, Boston, Massachusetts
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dan Boneh , Xuhua Ding , Gene Tsudik , Chi Ming Wong, A method for fast revocation of public key certificates and security capabilities, Proceedings of the 10th conference on USENIX Security Symposium, p.22-22, August 13-17, 2001, Washington, D.C.
|
|
|
|
|
|
|
|
Dan Boneh , Xuhua Ding , Gene Tsudik , Chi Ming Wong, A method for fast revocation of public key certificates and security capabilities, Proceedings of the 10th conference on USENIX Security Symposium, p.22-22, August 13-17, 2001, Washington, D.C.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Daniel Swinehart , Gene McDaniel , David Boggs, WFS a simple shared file system for a distributed environment, Proceedings of the seventh ACM symposium on Operating systems principles, p.9-17, December 10-12, 1979, Pacific Grove, California, United States
|
|
|
|
|
|
Vicky Liu , William Caelli , Ernest Foo , Selwyn Russell, Visually sealed and digitally signed documents, Proceedings of the 27th Australasian conference on Computer science, p.287-294, January 01, 2004, Dunedin, New Zealand
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Homer Wu , Chong-Yen Lee , Wuu-Yee Chen , Tsang-Yean Lee, Algorithm of cipher text containing key to produce cipher text transmitted in network security, Proceedings of the 6th Conference on 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases, p.201-205, February 16-19, 2007, Corfu Island, Greece
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Robert M. Arlein , Ben Jai , Markus Jakobsson , Fabian Monrose , Michael K. Reiter, Privacy-preserving global customization, Proceedings of the 2nd ACM conference on Electronic commerce, p.176-184, October 17-20, 2000, Minneapolis, Minnesota, United States
|
|
|
|
|
|
|
|
|
|
Chagit Attiya , Danny Dolev , Joseph Gil, Asynchronous Byzantine consensus, Proceedings of the third annual ACM symposium on Principles of distributed computing, p.119-133, August 27-29, 1984, Vancouver, British Columbia, Canada
|
|
|
|
Hao Yang , Xiaoqiao Meng , Songwu Lu, Self-organized network-layer security in mobile ad hoc networks, Proceedings of the 3rd ACM workshop on Wireless security, p.11-20, September 28-28, 2002, Atlanta, GA, USA
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
M. Sohlenkamp , P. Mambrey , W. Prinz , L. Fuchs , A. Syri , U. Pankoke-Babatz , K. Klöckner , S. Kolvenbach, Supporting the Distributed German Government with POLITeam, Multimedia Tools and Applications, v.12 n.1, p.39-58, September 2000
|
|
|
|
|
|
|
|
|
|
|
|
Ian E. Smith , Scott E. Hudson , Elizabeth D. Mynatt , John R. Selbie, Applying cryptographic techniques to problems in media space security, Proceedings of conference on Organizational computing systems, p.190-196, August 13-16, 1995, Milpitas, California, United States
|
|
|
|
Richard A. DeMillo , Nancy A. Lynch , Michael J. Merritt, Cryptographic protocols, Proceedings of the fourteenth annual ACM symposium on Theory of computing, p.383-400, May 05-07, 1982, San Francisco, California, United States
|
|
|
|
|
|
|
|
|
|
G. Edward Suh , Dwaine Clarke , Blaise Gassend , Marten van Dijk , Srinivas Devadas, AEGIS: architecture for tamper-evident and tamper-resistant processing, Proceedings of the 17th annual international conference on Supercomputing, June 23-26, 2003, San Francisco, CA, USA
|
|
|
|
|
|
Cheng Peng , Robert H. Deng , Yongdong Wu , Weizhong Shao, A flexible and scalable authentication scheme for JPEG2000 image codestreams, Proceedings of the eleventh ACM international conference on Multimedia, November 02-08, 2003, Berkeley, CA, USA
|
|
|
|
|
|
|
|
|
|
Ronald Watro , Derrick Kong , Sue-fen Cuti , Charles Gardiner , Charles Lynn , Peter Kruus, TinyPK: securing sensor networks with public key technology, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, October 25-25, 2004, Washington DC, USA
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Wm A. Wulf , Chenxi Wang , Darrell Kienzle, A new model of security for distributed systems, Proceedings of the 1996 workshop on New security paradigms, p.34-43, September 17-20, 1996, Lake Arrowhead, California, United States
|
|
|
|
|
|
|
|
|
|
|
|
Hua Wang , Lili Sun , Yanchun Zhang , Jinli Cao, Anonymous access scheme for electronic-services, Proceedings of the 27th Australasian conference on Computer science, p.295-304, January 01, 2004, Dunedin, New Zealand
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Don Davis, Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML, Proceedings of the General Track: 2002 USENIX Annual Technical Conference, p.65-78, June 25-30, 2001
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Olga Kornievskaia , Peter Honeyman , Bill Doster , Kevin Coffman, Kerberized credential translation: a solution to web access control, Proceedings of the 10th conference on USENIX Security Symposium, p.18-18, August 13-17, 2001, Washington, D.C.
|
|
|
|
|
|
Tzong-Sun Wu , Chien-Lung Hsu , Kuo-Yu Tsai , Han-Yu Lin , Tzong-Chen Wu, Convertible multi-authenticated encryption scheme, Information Sciences: an International Journal, v.178 n.1, p.256-263, January, 2008
|
|
|
|
|
|
|
|
Michel Abdalla , Emmanuel Bresson , Olivier Chevassut , Bodo Möller , David Pointcheval, Provably secure password-based authentication in TLS, Proceedings of the 2006 ACM Symposium on Information, computer and communications security, March 21-24, 2006, Taipei, Taiwan
|
|
Olga Kornievskaia , Peter Honeyman , Bill Doster , Kevin Coffman, Kerberized credential translation: a solution to web access control, Proceedings of the 10th conference on USENIX Security Symposium, p.18-18, August 13-17, 2001, Washington, D.C.
|
|
|
|
|
|
|
|
Qiang Huang , Johnas Cukier , Hisashi Kobayashi , Bede Liu , Jinyun Zhang, Fast authenticated key establishment protocols for self-organizing sensor networks, Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, September 19-19, 2003, San Diego, CA, USA
|
|
|
|
|
|
|
|
|
|
Ran Canetti , Uri Feige , Oded Goldreich , Moni Naor, Adaptively secure multi-party computation, Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, p.639-648, May 22-24, 1996, Philadelphia, Pennsylvania, United States
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Jean E. Vuillemin , Patrice Bertin , Didier Roncin , Mark Shand , Hervé H. Touati , Philippe Boucard, Programmable active memories: reconfigurable systems come of age, Readings in hardware/software co-design, Kluwer Academic Publishers, Norwell, MA, 2001
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Trent Jaeger , Aviel D. Rubin , Atul Prakash, Building systems that flexibly control downloaded executable context, Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography, p.14-14, July 22-25, 1996, San Jose, California
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Eithan Ephrati , Gilad Zlotkin , Jeffrey S. Rosenschein, Meet your destiny: a non-manipulable meeting scheduler, Proceedings of the 1994 ACM conference on Computer supported cooperative work, p.359-371, October 22-26, 1994, Chapel Hill, North Carolina, United States
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Kui Ren , Wenjing Lou , Kai Zeng , Feng Bao , Jianying Zhou , Robert H. Deng, Routing optimization security in mobile IPv6, Computer Networks: The International Journal of Computer and Telecommunications Networking, v.50 n.13, p.2401-2419, 15 September 2006
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Feifei Li , Marios Hadjieleftheriou , George Kollios , Leonid Reyzin, Dynamic authenticated index structures for outsourced databases, Proceedings of the 2006 ACM SIGMOD international conference on Management of data, June 27-29, 2006, Chicago, IL, USA
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Nikita Borisov , Ian Goldberg , Eric Brewer, Off-the-record communication, or, why not to use PGP, Proceedings of the 2004 ACM workshop on Privacy in the electronic society, October 28-28, 2004, Washington DC, USA
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Alfredo De Santis , Yvo Desmedt , Yair Frankel , Moti Yung, How to share a function securely, Proceedings of the twenty-sixth annual ACM symposium on Theory of computing, p.522-533, May 23-25, 1994, Montreal, Quebec, Canada
|
|
Michael K. Reiter , Matthew K. Franklin , John B. Lacy , Rebecca N. Wright, The Ω key management service, Proceedings of the 3rd ACM conference on Computer and communications security, p.38-47, March 14-15, 1996, New Delhi, India
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Prabal K. Dutta , Jonathan W. Hui , David C. Chu , David E. Culler, Securing the deluge Network programming system, Proceedings of the fifth international conference on Information processing in sensor networks, April 19-21, 2006, Nashville, Tennessee, USA
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Tatjana Curcic , Mark E. Filipkowski , Almadena Chtchelkanova , Philip A. D'Ambrosio , Stuart A. Wolf , Michael Foster , Douglas Cochran, Quantum networks: from quantum cryptography to quantum architecture, ACM SIGCOMM Computer Communication Review, v.34 n.5, October 2004
|
|
|
|
|
|
|
|
|
|
Eric Cronin , Sugih Jamin , Tal Malkin , Patrick McDaniel, On the performance, feasibility, and use of forward-secure signatures, Proceedings of the 10th ACM conference on Computer and communications security, October 27-30, 2003, Washington D.C., USA
|
|
|
|
|
|
|
|
|
|
Dahlia Malkhi , Noam Nisan , Benny Pinkas , Yaron Sella, Fairplay—a secure two-party computation system, Proceedings of the 13th conference on USENIX Security Symposium, p.20-20, August 09-13, 2004, San Diego, CA
|
|
Adrian Perrig , Robert Szewczyk , Victor Wen , David Culler , J. D. Tygar, SPINS: security protocols for sensor netowrks, Proceedings of the 7th annual international conference on Mobile computing and networking, p.189-199, July 2001, Rome, Italy
|
|
Amir Herzberg , Markus Jakobsson , Stanislław Jarecki , Hugo Krawczyk , Moti Yung, Proactive public key and signature systems, Proceedings of the 4th ACM conference on Computer and communications security, p.100-110, April 01-04, 1997, Zurich, Switzerland
|
|
|
|
Abhilasha Bhargav-Spantzel , Jan Camenisch , Thomas Gross , Dieter Sommer, User centricity: a taxonomy and open issues, Proceedings of the second ACM workshop on Digital identity management, November 03-03, 2006, Alexandria, Virginia, USA
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Jian Yin , Jean-Philippe Martin , Arun Venkataramani , Lorenzo Alvisi , Mike Dahlin, Separating agreement from execution for byzantine fault tolerant services, Proceedings of the nineteenth ACM symposium on Operating systems principles, October 19-22, 2003, Bolton Landing, NY, USA
|
|
Marten Dijk , Dwaine Clarke , Blaise Gassend , G. Edward Suh , Srinivas Devadas, Speeding up Exponentiation using an Untrusted Computational Resource, Designs, Codes and Cryptography, v.39 n.2, p.253-273, May 2006
|
|
|
|
|
|
|
|
Cynthia Dwork , Moni Naor , Amit Sahai, Concurrent zero-knowledge, Proceedings of the thirtieth annual ACM symposium on Theory of computing, p.409-418, May 24-26, 1998, Dallas, Texas, United States
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Yair Frankel , Philip D. MacKenzie , Moti Yung, Robust efficient distributed RSA-key generation, Proceedings of the thirtieth annual ACM symposium on Theory of computing, p.663-672, May 24-26, 1998, Dallas, Texas, United States
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Thomas Wollinger , Jan Pelzl , Volker Wittelsberger , Christof Paar , Gökay Saldamli , Çetin K. Koç, Elliptic and hyperelliptic curves on embedded μP, ACM Transactions on Embedded Computing Systems (TECS), v.3 n.3, p.509-533, August 2004
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
INDEX TERMS
Primary Classification:
E.
Data
Additional Classification:
K.
Computing Milieux
K.4
COMPUTERS AND SOCIETY
K.4.1
Public Policy Issues
Subjects:
Privacy
K.6
MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS
General Terms:
Design,
Human Factors,
Performance,
Security,
Theory
Keywords:
authentication,
cryptography,
digital signatures,
electronic funds transfer,
electronic mail,
factorization,
message-passing,
prime number,
privacy,
public-key cryptosystems,
security
Peer to Peer - Readers of this Article have also read:
-
Data structures for quadtree approximation and compression
Communications of the ACM
28, 9
Hanan Samet
-
A hierarchical single-key-lock access control using the Chinese remainder theorem
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied computing
Kim S. Lee
, Huizhu Lu
, D. D. Fisher
-
Putting innovation to work: adoption strategies for multimedia communication systems
Communications of the ACM
34, 12
Ellen Francik
, Susan Ehrlich Rudman
, Donna Cooper
, Stephen Levine
-
The GemStone object database management system
Communications of the ACM
34, 10
Paul Butterworth
, Allen Otis
, Jacob Stein
-
An intelligent component database for behavioral synthesis
Proceedings of the 27th ACM/IEEE conference on Design automation
Gwo-Dong Chen
, Daniel D. Gajski
|