Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
A key distribution system equivalent to factoring - MaRDI portal

A key distribution system equivalent to factoring

From MaRDI portal
Publication:1112781

DOI10.1007/BF02351718zbMath0659.94003OpenAlexW2033535959MaRDI QIDQ1112781

Kevin S. McCurley

Publication date: 1988

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/bf02351718




Related Items (24)

A key-exchange protocol using real quadratic fieldsAlgorithms for Black-Box Fields and their Application to CryptographyA new public key scheme based on DRSA and generalized GDLPA review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass pointAnonymous IBE, leakage resilience and circular security from new assumptionsBatch Diffie-Hellman key agreement systemsMathematical problems in cryptologyA new public key cryptosystem over ℤn2*An elliptic curve analogue of McCurley's key agreement schemeOn reducing factorization to the discrete logarithm problem modulo a compositeAn interactive identification scheme based on discrete logarithms and factoringGeneric hardness of inversion on ring and its relation to self-bilinear mapA public key encryption scheme based on factoring and discrete logarithmCascade ciphers: The importance of being firstThe RSA group is pseudo-freeA Digital Signature Scheme Based on Two Hard ProblemsОб использовании групп классов идеалов квадратичных полей для построения криптографических систем с открытым ключомA variant of digital signature algorithmPerfectly secure key distribution for dynamic conferencesSynthesizers and their application to the parallel construction of pseudo-random functionsNew efficient and secure protocols for verifiable signature sharing and other applicationsSecurity analysis and improvement of a double-trapdoor encryption schemeA traceable group signature scheme.A new cryptosystem using generalized Mersenne primes



Cites Work


This page was built for publication: A key distribution system equivalent to factoring