A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
about
Efficient privacy-preserving string search and an application in genomicsDesigning an algorithm to preserve privacy for medical record linkage with error-prone data.Electronic medical archives: a different approach to applying re-signing mechanisms to digital signatures.Logsum using Garbled Circuits.A covert authentication and security solution for GMOs.A study on user authentication methodology using numeric password and fingerprint biometric information.Redactable signatures for signed CDA Documents.A secure integrated medical information system.The security implications of VeriChip cloning.Security of quantum digital signatures for classical messages.A biometric authentication scheme for telecare medicine information systems with nonce.A digital memories based user authentication scheme with privacy preservation.DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation.New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing.Synchronization and an application of a novel fractional order King Cobra chaotic system.An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem.A provably secure revocable ID-based authenticated group key exchange protocol with identifying malicious participants.A secure authentication scheme for telecare medicine information systems.Calculating optimal addition chainsA novel text and image encryption method based on chaos theory and DNA computingSecurity Analysis of the Strong Diffie-Hellman ProblemPreserving differential privacy for similarity measurement in smart environmentsEncryption Switching ProtocolsRobust Password-Protected Secret SharingEncoding-Free ElGamal Encryption Without Random OraclesStrengthening a curated web of trust in a geographically distributed projectCSP-DHIES: a new public-key encryption scheme from matrix conjugationA Note on Fault Attacks Against Deterministic Signature Schemes (Short Paper)Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?On batch verification with group testing for vehicular communicationsAn Efficient Collision Detection Method for Computing Discrete Logarithms with Pollard's RhoCryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known SignersAn Agent-Based Auction Protocol on Mobile DevicesConjugacy Systems Based on Nonabelian Factorization Problems and Their Applications in CryptographyPreimage Selective Trapdoor Function: How to Repair an Easy ProblemA Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile DevicesLattice Based Mix Network for Location Privacy in Mobile SystemA Simple Provably Secure AKE from the LWE ProblemAn Efficient Secret Key Homomorphic Encryption Used in Image Processing ServiceExperimental demonstration of kilometer-range quantum digital signatures
P2860
Q24658587-8D9EBFA1-DA0E-474E-BA75-F8DEA00D91C7Q30884985-2AC8809E-D6FF-49DA-B4F3-DEA75175A6E1Q33655222-E31072F3-2FF9-4335-91D6-81FBD02E452EQ35587446-417C72C0-2455-4E2E-9DF5-B8670818852DQ36139545-80415CB2-1590-4693-BEC6-BD9F3FE45903Q37208700-11DC8FEA-48FF-4B2A-9829-988E976AD2F0Q38429309-22C98B35-7831-423D-8B01-C50E902F4969Q39690847-6C626395-5A4C-40C2-A71B-EBC9355A4CCFQ39763574-D2F4BFB3-C053-4357-B623-C7D177018864Q40264498-1E6C7AFA-FCA0-4112-B60D-F589F28589F3Q44417608-446539F0-CC75-4EBF-AA3C-E7B6B0C77C22Q47159938-77496FB1-8A10-4A3E-9C7E-CC8EBBD9D833Q47284536-24151DC2-AFB6-4712-8CF4-FCE48DD6774EQ50860997-C3321766-49E1-4037-9D50-4464C14D9730Q51030544-A0FF39F1-3DD7-4824-BAC9-7A4629823693Q51117602-7041258B-4189-4258-83AD-EFC195302FDCQ51587461-87DA2A85-DAFF-401B-B4D1-BEB49A9EC438Q51610640-B3C3A246-35C0-4657-8F3F-EC182D83B1ABQ55953253-A8EAECC0-EE68-41AB-9AFA-7C86C294B8E6Q56040473-B625463F-1753-44FD-A72F-B1A3E1A79209Q56114288-8C287106-9FF0-4195-A4A7-126D40F795AFQ56524865-58C7C41D-B9F4-4F52-B086-8113CBD2DBBBQ56920946-EDB609C5-8C9B-4467-8E23-0514DD9EF3BBQ56920950-4B5C61A4-1FE6-4F88-97C0-D6404496BA17Q56921226-25F7AF8F-E716-4902-8BA1-3DBE0F738FEAQ57530391-F4A16ED0-484B-42BA-A2C3-F865861A4DB1Q57631856-9BDEBD48-8FD6-4D33-BC1C-B67ACD98D98FQ57717390-9EBBCA0D-019C-474A-968B-E4CA06A36C1FQ57717424-AB0235DC-A997-4FD0-8B24-9EA13233E30DQ58033180-0A4F9C8E-947B-4C3F-8CEE-3E8CD08C5C58Q58906288-F0D15F74-2051-4CE9-9474-6D31D8F2117FQ59030100-80C34259-D2D6-4414-BDFD-71D81D272938Q59050846-E026C2EF-BB8C-4A35-8766-5DFC730D1A4FQ59053865-B5106AAB-58EF-44E5-B22F-EE0058696285Q59067642-F538EB79-8293-4DFD-95B9-AAFDF4219885Q59108547-C5202692-2929-47B9-BB60-5AA1C1539865Q59118387-ABD707C9-2908-412C-AE3F-2EEE9A7AB1B8Q59147307-33662808-B583-4983-8EC3-223816EA9D63Q59148028-7F667C39-BD0D-401D-927A-BA9C707B0C2CQ59202439-4BCC848A-DFDF-4E64-89ED-75A28150D3AE
P2860
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
description
redactioneel artikel in IEEE Transactions on Information Theory
@nl
name
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
@en
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
@nl
type
label
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
@en
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
@nl
prefLabel
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
@en
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
@nl
P356
P1476
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
@en
P31
P356
10.1109/TIT.1985.1057074