No results for "Category:Attacks on public-key cryptosystems" (auto) in titles.

Suggestions for article titles:

  1. Cryptosystem: In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, such as confidentiality (encryption). Typically, a cryptosystem consists of three algorithms: one for key generation, one for encryption, and one for decryption. (Suite of cryptographic algorithms needed to implement a particular security service) [100%] 2024-05-05 [Cryptography]
  2. Cryptosystem: In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, such as confidentiality (encryption). Typically, a cryptosystem consists of three algorithms: one for key generation, one for encryption, and one for decryption. (Suite of cryptographic algorithms needed to implement a particular security service) [100%] 2024-08-10 [Cryptography]
  3. List of cryptosystems: A cryptosystem is a set of cryptographic algorithms that map ciphertexts and plaintexts to each other. Private-key cryptosystems use the same key for encryption and decryption. (None) [72%] 2022-09-23 [Cryptography] [Algorithms]...
  4. Paillier cryptosystem: The Paillier cryptosystem, invented by and named after Pascal Paillier in 1999, is a probabilistic asymmetric algorithm for public key cryptography. The problem of computing n-th residue classes is believed to be computationally difficult. (Algorithm for public key cryptography) [70%] 2023-06-09 [Public-key encryption schemes]
  5. Hybrid cryptosystem: Hybrid cryptosystems combine public key (asymmetric) cryptography with secret key (symmetric) techniques such as block ciphers, stream ciphers and cryptographic hashes. Because asymmetric techniques are typically slower than symmetric techniques by orders of magnitude, it is more efficient to only ... [70%] 2023-08-12
  6. McEliece cryptosystem: In cryptography, the McEliece cryptosystem is an asymmetric encryption algorithm developed in 1978 by Robert McEliece. It was the first such scheme to use randomization in the encryption process. (Asymmetric encryption algorithm developed by Robert McEliece) [70%] 2024-10-31 [Post-quantum cryptography]
  7. Naccache–Stern cryptosystem: The Naccache–Stern cryptosystem is a homomorphic public-key cryptosystem whose security rests on the higher residuosity problem. The Naccache–Stern cryptosystem was discovered by David Naccache and Jacques Stern in 1998. [57%] 2023-08-09 [Public-key encryption schemes]
  8. Cramer–Shoup cryptosystem: The Cramer–Shoup system is an asymmetric key encryption algorithm, and was the first efficient scheme proven to be secure against adaptive chosen ciphertext attack using standard cryptographic assumptions. Its security is based on the computational intractability (widely assumed, but ... [57%] 2023-12-08 [Public-key encryption schemes]
  9. Goldwasser–Micali cryptosystem: The Goldwasser–Micali (GM) cryptosystem is an asymmetric key encryption algorithm developed by Shafi Goldwasser and Silvio Micali in 1982. GM has the distinction of being the first probabilistic public-key encryption scheme which is provably secure under standard cryptographic ... (Asymmetric key encryption algorithm) [57%] 2023-04-20 [Public-key encryption schemes]
  10. Merkle–Hellman knapsack cryptosystem: The Merkle–Hellman knapsack cryptosystem was one of the earliest public key cryptosystems. It was published by Ralph Merkle and Martin Hellman in 1978. [50%] 2023-06-25 [Public-key encryption schemes] [Broken cryptography algorithms]...

external From search of external encyclopedias:

0