Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1303131 - MaRDI portal

scientific article; zbMATH DE number 1303131

From MaRDI portal
Publication:4249647

zbMath0919.94028MaRDI QIDQ4249647

Shigenori Uchiyama, Tatsuaki Okamoto

Publication date: 9 September 1999


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (40)

Factoring multi-power RSA moduli with primes sharing least or most significant bitsNew weak keys in RSACryptanalysis of an RSA variant with moduli \(N=p^r q^l\)Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systemsEfficient cryptosystems from \(2^k\)-th power residue symbolsOne-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard modelPrivacy-preserving anomaly detection in cloud with lightweight homomorphic encryptionA verifiable secret shuffle of homomorphic encryptionsCryptographic algorithms for privacy-preserving online applicationsSmall secret exponent attack on RSA variant with modulus \(N=p^rq\)A generalized attack on the multi-prime power RSAShort-lived zero-knowledge proofs and signaturesSpreading alerts quietly and the subgroup escape problemCryptanalysis of the multi-power RSA cryptosystem variantVector commitments over rings and compressed \(\varSigma \)-protocolsGroup homomorphic encryption: characterizations, impossibility results, and applicationsImproved cryptanalysis of the multi-power RSA cryptosystem variantSecure integration of asymmetric and symmetric encryption schemesHomomorphic public-key cryptosystems and encrypting Boolean circuitsAn efficient IND-CCA2 secure Paillier-based cryptosystemTwo Generic Constructions of Probabilistic Cryptosystems and Their ApplicationsHomomorphic Encryptions of Sums of GroupsBenaloh’s Dense Probabilistic Encryption RevisitedA new public key cryptosystem based on Edwards curvesOn the security of public key cryptosystems with a double decryption mechanismFormal and Precise Analysis of Soundness of Several Shuffling SchemesNew number-theoretic cryptographic primitivesA Watermarking Scheme in the Encrypted Domain for Watermarking ProtocolLinearly Homomorphic Encryption from $$\mathsf {DDH}$$A new generalization of the KMOV cryptosystemA New Rabin-type Trapdoor Permutation Equivalent to FactoringAn efficient privacy-preserving compressive data gathering scheme in WSNsAlgebraic cryptography: new constructions and their security against provable breakHybrid commitments and their applications to zero-knowledge proof systemsA Secure M + 1st Price Auction Protocol Based on Bit Slice CircuitsA public key cryptosystem based on a subgroup membership problemOptimally Sound Sigma Protocols Under DCRAPublic-key cryptography and invariant theoryOn non-Abelian homomorphic public-key cryptosystemsRevisiting prime power RSA




This page was built for publication: