The Naccache–Stern cryptosystem is a homomorphic public-key cryptosystem whose security rests on the higher residuosity problem. The Naccache–Stern cryptosystem...
3 KB (549 words) - 17:50, 28 January 2023
Naccache–Stern Knapsack cryptosystem is an atypical public-key cryptosystem developed by David Naccache and Jacques Stern in 1997. This cryptosystem is...
4 KB (565 words) - 17:03, 1 June 2024
similarly named but very distinct Naccache-Stern cryptosystem and Naccache-Stern knapsack cryptosystem. In 2004 David Naccache and Claire Whelan, then employed...
3 KB (315 words) - 08:03, 1 April 2024
signature. The Naccache–Stern cryptosystem and the Okamoto–Uchiyama cryptosystem are historical antecedents of Paillier. The Damgård–Jurik cryptosystem is a generalization...
13 KB (1,929 words) - 21:01, 7 December 2023
The RSA (Rivest–Shamir–Adleman) cryptosystem is a public-key cryptosystem, one of the oldest widely used for secure data transmission. The initialism...
60 KB (7,783 words) - 17:58, 20 June 2025
design of the Pointcheval–Stern signature algorithm, the Naccache–Stern cryptosystem and Naccache–Stern knapsack cryptosystem, and the block ciphers CS-Cipher...
3 KB (166 words) - 13:50, 16 October 2024
Other partially homomorphic cryptosystems Okamoto–Uchiyama cryptosystem Naccache–Stern cryptosystem Damgård–Jurik cryptosystem Sander–Young–Yung encryption...
42 KB (4,692 words) - 23:00, 1 April 2025
In cryptography, the McEliece cryptosystem is an asymmetric encryption algorithm developed in 1978 by Robert McEliece. It was the first such scheme to...
16 KB (2,092 words) - 15:59, 4 June 2025
subset sum problem, a special case of the above Naccache-Stern knapsack cryptosystem, a cryptosystem based on the knapsack problem Knapsack (band), an...
475 bytes (99 words) - 10:34, 7 March 2021
security, compared to cryptosystems based on modular exponentiation in Galois fields, such as the RSA cryptosystem and ElGamal cryptosystem. Elliptic curves...
39 KB (4,677 words) - 13:04, 20 May 2025
(1969-), French neurologist David Naccache (1967-), cryptographer See also: Naccache–Stern cryptosystem Huda Naccache, Arab-Israeli model This disambiguation...
335 bytes (68 words) - 19:17, 12 December 2023
The Rabin cryptosystem is a family of public-key encryption schemes based on a trapdoor function whose security, like that of RSA, is related to the difficulty...
14 KB (2,077 words) - 14:01, 26 March 2025
ElGamal encryption (redirect from Elgamal discrete logarithm cryptosystem)
ElGamal cryptosystem is usually used as part of a hybrid cryptosystem, where the message itself is encrypted using a symmetric cryptosystem, and ElGamal...
10 KB (1,473 words) - 11:12, 31 March 2025
The Merkle–Hellman knapsack cryptosystem was one of the earliest public key cryptosystems. It was published by Ralph Merkle and Martin Hellman in 1978...
10 KB (1,852 words) - 02:34, 9 June 2025
Three-pass protocol (redirect from Massey-Omura cryptosystem)
E(a,E(b,m)) = mab mod p = mba mod p = E(b,E(a,m)). The Massey–Omura Cryptosystem was proposed by James Massey and Jim K. Omura in 1982 as a possible improvement...
8 KB (1,293 words) - 22:17, 11 February 2025
Cryptography (section Cryptosystems)
is needed to decrypt the ciphertext. In formal mathematical terms, a "cryptosystem" is the ordered list of elements of finite possible plaintexts, finite...
100 KB (11,007 words) - 01:11, 20 June 2025
A threshold cryptosystem, the basis for the field of threshold cryptography, is a cryptosystem that protects information by encrypting it and distributing...
8 KB (868 words) - 22:39, 15 March 2024
In cryptography, the Niederreiter cryptosystem is a variation of the McEliece cryptosystem developed in 1986 by Harald Niederreiter. It applies the same...
5 KB (675 words) - 02:49, 7 July 2023
Ronald Cramer and Victor Shoup in 1998, it is an extension of the ElGamal cryptosystem. In contrast to ElGamal, which is extremely malleable, Cramer–Shoup adds...
7 KB (1,125 words) - 17:33, 23 July 2024
Identity-based cryptography (redirect from Identity-based cryptosystem)
Based Encryption Boneh–Franklin Shamir, Adi (1985). "Identity-Based Cryptosystems and Signature Schemes" (PDF). In Blakley, George Robert; Chaum, David...
7 KB (868 words) - 15:50, 7 December 2024
curve cryptography. David Naccache, inventor of the Naccache–Stern cryptosystem and of the Naccache–Stern knapsack cryptosystem. Moni Naor, co-inventor...
22 KB (2,482 words) - 19:21, 23 June 2025
The Damgård–Jurik cryptosystem is a generalization of the Paillier cryptosystem. It uses computations modulo n s + 1 {\displaystyle n^{s+1}} where n {\displaystyle...
4 KB (760 words) - 06:15, 16 January 2025
solve the Diffie–Hellman problem, making this and many other public key cryptosystems insecure. Fields of small characteristic may be less secure. The order...
47 KB (5,306 words) - 14:45, 23 June 2025
The Benaloh Cryptosystem is an extension of the Goldwasser-Micali cryptosystem (GM) created in 1985 by Josh (Cohen) Benaloh. The main improvement of the...
4 KB (751 words) - 11:00, 9 September 2020
RLWE-KEX RLWE-SIG Others AE CEILIDH EPOC HFE IES Lamport McEliece Merkle–Hellman Naccache–Stern knapsack cryptosystem Three-pass protocol XTR SQIsign...
24 KB (3,527 words) - 01:54, 19 June 2025
RLWE-KEX RLWE-SIG Others AE CEILIDH EPOC HFE IES Lamport McEliece Merkle–Hellman Naccache–Stern knapsack cryptosystem Three-pass protocol XTR SQIsign...
35 KB (4,124 words) - 20:07, 8 June 2025
The Goldwasser–Micali (GM) cryptosystem is an asymmetric key encryption algorithm developed by Shafi Goldwasser and Silvio Micali in 1982. GM has the distinction...
7 KB (976 words) - 18:47, 24 August 2023
The Schmidt-Samoa cryptosystem is an asymmetric cryptographic technique, whose security, like Rabin depends on the difficulty of integer factorization...
2 KB (368 words) - 00:49, 18 June 2023
under an adaptive chosen message attack. All public key / private key cryptosystems depend entirely on keeping the private key secret. A private key can...
45 KB (5,315 words) - 16:52, 11 April 2025
Hidden Field Equations (redirect from HFE (cryptosystem))
Equations (HFE), also known as HFE trapdoor function, is a public key cryptosystem which was introduced at Eurocrypt in 1996 and proposed by (in French)...
14 KB (2,622 words) - 08:03, 9 February 2025