Stem cryptosystem$ (all stems)
14 papers:
- ICALP-v2-2011-LibertY #adaptation
- Adaptively Secure Non-interactive Threshold Cryptosystems (BL, MY), pp. 588–600.
- STOC-2009-Peikert #problem #worst-case
- Public-key cryptosystems from the worst-case shortest vector problem: extended abstract (CP), pp. 333–342.
- LATA-2009-ClarridgeS #automaton #composition
- A Cryptosystem Based on the Composition of Reversible Cellular Automata (AC, KS), pp. 314–325.
- ICPR-2008-WuWZ
- A cryptosystem based on palmprint feature (XW, KW, DZ), pp. 1–4.
- ICPR-v4-2006-NagarC #design #fuzzy #symmetry #using
- Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme (AN, SC), pp. 537–540.
- DATE-2005-CheungLC #configuration management
- Reconfigurable Elliptic Curve Cryptosystems on a Chip (RCCC, WL, PYKC), pp. 24–29.
- DATE-2005-YangWVSX #approach #design
- Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach (SY, WW, NV, DNS, YX), pp. 64–69.
- ICALP-2000-BaudronPS #multi #security
- Extended Notions of Security for Multicast Public Key Cryptosystems (OB, DP, JS), pp. 499–511.
- STOC-1997-AjtaiD #equivalence #worst-case
- A Public-Key Cryptosystem with Worst-Case/Average-Case Equivalence (MA, CD), pp. 284–293.
- DLT-1997-Polemi #algebra #geometry
- An Algebraic-Geometric Public Key Cryptosystem (DP), pp. 521–528.
- ICALP-1995-BaoI #automaton #finite
- Break Finite Automata Public Key Cryptosystem (FB, YI), pp. 147–158.
- STOC-1990-NaorY
- Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks (MN, MY), pp. 427–437.
- ICALP-1984-Lagarias #analysis #performance
- Performance Analysis of Shamir’s Attack on the Basic Merkle-Hellman Knapsack Cryptosystem (JCL), pp. 312–323.
- STOC-1983-Adleman #on the
- On Breaking Generalized Knapsack Public Key Cryptosystems (Abstract) (LMA), pp. 402–412.