Back to Results
First PageMeta Content
Security / Paillier cryptosystem / Merkle–Hellman knapsack cryptosystem / Niederreiter cryptosystem / Cryptography / Post-quantum cryptography / Cryptosystem / RSA / Semantic security / Public-key cryptography / Cyberwarfare / Applied mathematics


Noname manuscript No. (will be inserted by the editor) Generalizing Cryptosystems Based on the Subset Sum Problem Aniket Kate · Ian Goldberg
Add to Reading List

Document Date: 2011-05-05 15:39:42


Open Document

File Size: 200,08 KB

Share Result on Facebook

City

New York / Saarbruecken / Lattice / /

Country

Germany / Canada / /

Currency

pence / /

/

Event

Dividend Issuance / /

Facility

exhausMax Planck Institute / University of Waterloo / /

IndustryTerm

multi-chip solution / above multi-chip solution / worst computation-constrained identification protocol / quantum algorithm / privacy-preserving identification protocol / privacy solution / polynomial-time algorithm / encryption protocol / web resource / above solution / tive database search / important tool / multiplicative / reconstruction algorithm / privacy-preserving authentication protocol / privacy protocols / identification protocols / constrained devices / workable solution / search space / /

OperatingSystem

DoS / /

Organization

sysDavid R. Cheriton School of Computer Science / University of Waterloo / U.S. Securities and Exchange Commission / exhausMax Planck Institute for Software Systems / Natural Sciences and Engineering Research Council of Canada / /

Person

Ian Goldberg / Decryption / Greg Zaverucha / /

Position

editor / least positive representative / /

ProvinceOrState

New York / /

PublishedMedium

IEEE Transactions On Information Theory / /

Technology

quantum algorithm / 6.1 Privacy-Preserving Identification Protocol / 1 Privacy-preserving Identification Protocol / Improved LowDenisty Subset Sum Algorithm / cloning / private key / distributed protocol / secret key / two RFID chips / RFID chips / public key encryption / encryption / L2 algorithm / RFID chip / identification protocols / one chip / cryptography / Lightweight Asymmetric Privacy-Preserving Authentication Protocols / legitimate RFID chip / involved chips / public key / privacy-preserving authentication protocol / two chips / privacy protocols / LLL algorithm / polynomial-time algorithm / http / encryption protocol / worst computation-constrained identification protocol / DLP / reconstruction algorithm / communication privacy using public key encryption / privacy-preserving identification protocol / /

SocialTag