Sign in
Author

Conference

Journal

Organization

Year

DOI
Look for results that meet for the following criteria:
since
equal to
before
between
and
Search in all fields of study
Limit my searches in the following fields of study
Agriculture Science
Arts & Humanities
Biology
Chemistry
Computer Science
Economics & Business
Engineering
Environmental Sciences
Geosciences
Material Science
Mathematics
Medicine
Physics
Social Science
Multidisciplinary
Keywords
(3)
Discrete Logarithm
public key cryptosystem
Signature Scheme
Related Publications
(1)
A new remote user authentication scheme using smart cards
Subscribe
Academic
Publications
A public key cryptosystem and a signature scheme based on discrete logarithms
A public key cryptosystem and a signature scheme based on discrete logarithms,IEEE Transactions on Information Theory,T. Eigamal
Edit
A public key cryptosystem and a signature scheme based on discrete logarithms
(
Citations: 2066
)
BibTex

RIS

RefWorks
Download
T. Eigamal
Journal:
IEEE Transactions on Information Theory  TIT
, 1985
Cumulative
Annual
Citation Context
(1316)
...The second classical problem is the discrete logarithm problem (DLP) over a finite field ℤ
_{ p }
,
p
being a large prime; the ElGamal protocol
14
and all its variants are based on this problem...
JoanJosep Climent
,
et al.
Key exchange protocols over noncommutative rings. The case of
...The security of various current cryptosystems, such as the Diffie–Hellman key agreement protocol [6], the ElGamal cryptosystem [
8
], and some signature schemes [8,16], rely on the hardness of DLPs...
...The security of various current cryptosystems, such as the Diffie–Hellman key agreement protocol [6], the ElGamal cryptosystem [8], and some signature schemes [
8
,16], rely on the hardness of DLPs...
Jung Hee Cheon
,
et al.
Accelerating Pollard’s Rho Algorithm on Finite Fields
...It is based on a simple modification of the ElGamal encryption scheme [
26
]: let be a group of prime order and let be a generator of ; Alice and Bob publish the public keys and (respectively) and keeps secret their discrete logarithms and . To send a message to Alice, a sender picks uniformly at random an integer and transmits the pair where and . The proxy is given the reencryption key to divert ciphertexts from Alice to Bob via computing ...
Benoît Libert
,
et al.
Unidirectional ChosenCiphertext Secure Proxy ReEncryption
...Modular division and multiplication operations, the fundamental arithmetic operations, have important application in many prevailing publickey cryptosystems such as RSA (Rivest, Shamir, and Adleman
1978
), ElGamal (
1985
) and elliptic curve cryptography (ECC) (Koblitz
1987
)...
Chuanpeng Chen
,
et al.
Efficient algorithm and systolic architecture for modular division
...ElGamal cryptosystem [
11
] is the classical example of multiplicatively homomorphic scheme, whereas Paillier’s one [15] is an additively homomorphic encryption scheme...
Javier Herranz
.
Restricted adaptive oblivious transfer
Sort by:
Citations
(2066)
Key exchange protocols over noncommutative rings. The case of
(
Citations: 2
)
JoanJosep Climent
,
Pedro R. Navarro
,
Leandro Tortosa
Journal:
International Journal of Computer Mathematics  IJCM
, vol. aheadofp, no. aheadofp, pp. 111, 2012
Accelerating Pollard’s Rho Algorithm on Finite Fields
Jung Hee Cheon
,
Jin Hong
,
Minkyu Kim
Journal:
Journal of Cryptology  JOC
, vol. 25, no. 2, pp. 148, 2012
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic IDbased remote user authentication scheme'
(
Citations: 3
)
Muhammad Khurram Khan
,
SooKyun Kim
,
Khaled Alghathbar
Journal:
Computer Communications  COMCOM
, vol. 34, no. 3, pp. 305309, 2011
Assisted electrochemical conversion of nitrogen heterocompounds using active hydrogen passing through a Pd membrane. A non conventional diesel and VGO hydrotreating option
(
Citations: 1
)
Luis F. D’Elia Camacho
,
J. Moncada
,
E. Lucena
,
Z. Puentes
,
K. Saavedra
Journal:
Fuel
, vol. 90, no. 2, pp. 789794, 2011
Unidirectional ChosenCiphertext Secure Proxy ReEncryption
(
Citations: 1
)
Benoît Libert
,
Damien Vergnaud
Journal:
IEEE Transactions on Information Theory  TIT
, vol. 57, no. 3, pp. 17861802, 2011