scientific article; zbMATH DE number 1303131
From MaRDI portal
Publication:4249647
zbMath0919.94028MaRDI QIDQ4249647
Shigenori Uchiyama, Tatsuaki Okamoto
Publication date: 9 September 1999
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (40)
Factoring multi-power RSA moduli with primes sharing least or most significant bits ⋮ New weak keys in RSA ⋮ Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\) ⋮ Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems ⋮ Efficient cryptosystems from \(2^k\)-th power residue symbols ⋮ One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model ⋮ Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption ⋮ A verifiable secret shuffle of homomorphic encryptions ⋮ Cryptographic algorithms for privacy-preserving online applications ⋮ Small secret exponent attack on RSA variant with modulus \(N=p^rq\) ⋮ A generalized attack on the multi-prime power RSA ⋮ Short-lived zero-knowledge proofs and signatures ⋮ Spreading alerts quietly and the subgroup escape problem ⋮ Cryptanalysis of the multi-power RSA cryptosystem variant ⋮ Vector commitments over rings and compressed \(\varSigma \)-protocols ⋮ Group homomorphic encryption: characterizations, impossibility results, and applications ⋮ Improved cryptanalysis of the multi-power RSA cryptosystem variant ⋮ Secure integration of asymmetric and symmetric encryption schemes ⋮ Homomorphic public-key cryptosystems and encrypting Boolean circuits ⋮ An efficient IND-CCA2 secure Paillier-based cryptosystem ⋮ Two Generic Constructions of Probabilistic Cryptosystems and Their Applications ⋮ Homomorphic Encryptions of Sums of Groups ⋮ Benaloh’s Dense Probabilistic Encryption Revisited ⋮ A new public key cryptosystem based on Edwards curves ⋮ On the security of public key cryptosystems with a double decryption mechanism ⋮ Formal and Precise Analysis of Soundness of Several Shuffling Schemes ⋮ New number-theoretic cryptographic primitives ⋮ A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol ⋮ Linearly Homomorphic Encryption from $$\mathsf {DDH}$$ ⋮ A new generalization of the KMOV cryptosystem ⋮ A New Rabin-type Trapdoor Permutation Equivalent to Factoring ⋮ An efficient privacy-preserving compressive data gathering scheme in WSNs ⋮ Algebraic cryptography: new constructions and their security against provable break ⋮ Hybrid commitments and their applications to zero-knowledge proof systems ⋮ A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits ⋮ A public key cryptosystem based on a subgroup membership problem ⋮ Optimally Sound Sigma Protocols Under DCRA ⋮ Public-key cryptography and invariant theory ⋮ On non-Abelian homomorphic public-key cryptosystems ⋮ Revisiting prime power RSA
This page was built for publication: