Benaloh cryptosystem

Results: 3



#Item
1RSA / Prime number / Applied mathematics / Schmidt–Samoa cryptosystem / Benaloh cryptosystem / Public-key cryptography / Electronic commerce / Mathematics

13 RSA Encryption The mathematics behind the very successful RSA encryption method is very simple and uses mainly Euler’s congruence for any N ≥ 1:

Add to Reading List

Source URL: www.math.caltech.edu

Language: English - Date: 2001-05-04 18:10:28
2Public-key cryptography / Hidden Field Equations / Multivariate cryptography / QUAD / XTR / Trapdoor function / RSA / Index of cryptography articles / Benaloh cryptosystem / Cryptography / Post-quantum cryptography / Finite fields

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-04-04 07:06:39
3Homomorphic encryption / Malleability / Blind signature / RSA / Semantic security / Digital signature / Damgård–Jurik cryptosystem / Benaloh cryptosystem / Cryptography / Public-key cryptography / Paillier cryptosystem

PDF Document

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2002-11-19 09:06:37
UPDATE