Stem cryptosystem$ (all stems)
14 papers:
ICALP-v2-2011-LibertY #adaptation- Adaptively Secure Non-interactive Threshold Cryptosystems (BL, MY), pp. 588–600.
STOC-2009-Peikert #problem #worst-case- Public-key cryptosystems from the worst-case shortest vector problem: extended abstract (CP), pp. 333–342.
LATA-2009-ClarridgeS #automaton #composition- A Cryptosystem Based on the Composition of Reversible Cellular Automata (AC, KS), pp. 314–325.
ICPR-2008-WuWZ- A cryptosystem based on palmprint feature (XW, KW, DZ), pp. 1–4.
ICPR-v4-2006-NagarC #design #fuzzy #symmetry #using- Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme (AN, SC), pp. 537–540.
DATE-2005-CheungLC #configuration management- Reconfigurable Elliptic Curve Cryptosystems on a Chip (RCCC, WL, PYKC), pp. 24–29.
DATE-2005-YangWVSX #approach #design- Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach (SY, WW, NV, DNS, YX), pp. 64–69.
ICALP-2000-BaudronPS #multi #security- Extended Notions of Security for Multicast Public Key Cryptosystems (OB, DP, JS), pp. 499–511.
STOC-1997-AjtaiD #equivalence #worst-case- A Public-Key Cryptosystem with Worst-Case/Average-Case Equivalence (MA, CD), pp. 284–293.
DLT-1997-Polemi #algebra #geometry- An Algebraic-Geometric Public Key Cryptosystem (DP), pp. 521–528.
ICALP-1995-BaoI #automaton #finite- Break Finite Automata Public Key Cryptosystem (FB, YI), pp. 147–158.
STOC-1990-NaorY- Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks (MN, MY), pp. 427–437.
ICALP-1984-Lagarias #analysis #performance- Performance Analysis of Shamir’s Attack on the Basic Merkle-Hellman Knapsack Cryptosystem (JCL), pp. 312–323.
STOC-1983-Adleman #on the- On Breaking Generalized Knapsack Public Key Cryptosystems (Abstract) (LMA), pp. 402–412.