• The NaccacheStern cryptosystem is a homomorphic public-key cryptosystem whose security rests on the higher residuosity problem. The NaccacheStern cryptosystem...
    3 KB (549 words) - 17:50, 28 January 2023
  • NaccacheStern Knapsack cryptosystem is an atypical public-key cryptosystem developed by David Naccache and Jacques Stern in 1997. This cryptosystem is...
    4 KB (565 words) - 17:03, 1 June 2024
  • Thumbnail for David Naccache
    similarly named but very distinct Naccache-Stern cryptosystem and Naccache-Stern knapsack cryptosystem. In 2004 David Naccache and Claire Whelan, then employed...
    3 KB (315 words) - 08:03, 1 April 2024
  • signature. The NaccacheStern cryptosystem and the Okamoto–Uchiyama cryptosystem are historical antecedents of Paillier. The Damgård–Jurik cryptosystem is a generalization...
    13 KB (1,929 words) - 21:01, 7 December 2023
  • The RSA (Rivest–Shamir–Adleman) cryptosystem is a public-key cryptosystem, one of the oldest widely used for secure data transmission. The initialism...
    60 KB (7,783 words) - 17:58, 20 June 2025
  • Thumbnail for Jacques Stern
    design of the Pointcheval–Stern signature algorithm, the NaccacheStern cryptosystem and NaccacheStern knapsack cryptosystem, and the block ciphers CS-Cipher...
    3 KB (166 words) - 13:50, 16 October 2024
  • Other partially homomorphic cryptosystems Okamoto–Uchiyama cryptosystem NaccacheStern cryptosystem Damgård–Jurik cryptosystem Sander–Young–Yung encryption...
    42 KB (4,692 words) - 23:00, 1 April 2025
  • In cryptography, the McEliece cryptosystem is an asymmetric encryption algorithm developed in 1978 by Robert McEliece. It was the first such scheme to...
    16 KB (2,092 words) - 15:59, 4 June 2025
  • subset sum problem, a special case of the above Naccache-Stern knapsack cryptosystem, a cryptosystem based on the knapsack problem Knapsack (band), an...
    475 bytes (99 words) - 10:34, 7 March 2021
  • security, compared to cryptosystems based on modular exponentiation in Galois fields, such as the RSA cryptosystem and ElGamal cryptosystem. Elliptic curves...
    39 KB (4,677 words) - 13:04, 20 May 2025
  • (1969-), French neurologist David Naccache (1967-), cryptographer See also: NaccacheStern cryptosystem Huda Naccache, Arab-Israeli model This disambiguation...
    335 bytes (68 words) - 19:17, 12 December 2023
  • The Rabin cryptosystem is a family of public-key encryption schemes based on a trapdoor function whose security, like that of RSA, is related to the difficulty...
    14 KB (2,077 words) - 14:01, 26 March 2025
  • ElGamal cryptosystem is usually used as part of a hybrid cryptosystem, where the message itself is encrypted using a symmetric cryptosystem, and ElGamal...
    10 KB (1,473 words) - 11:12, 31 March 2025
  • The Merkle–Hellman knapsack cryptosystem was one of the earliest public key cryptosystems. It was published by Ralph Merkle and Martin Hellman in 1978...
    10 KB (1,852 words) - 02:34, 9 June 2025
  • E(a,E(b,m)) = mab mod p = mba mod p = E(b,E(a,m)). The Massey–Omura Cryptosystem was proposed by James Massey and Jim K. Omura in 1982 as a possible improvement...
    8 KB (1,293 words) - 22:17, 11 February 2025
  • Thumbnail for Cryptography
    is needed to decrypt the ciphertext. In formal mathematical terms, a "cryptosystem" is the ordered list of elements of finite possible plaintexts, finite...
    100 KB (11,007 words) - 01:11, 20 June 2025
  • A threshold cryptosystem, the basis for the field of threshold cryptography, is a cryptosystem that protects information by encrypting it and distributing...
    8 KB (868 words) - 22:39, 15 March 2024
  • In cryptography, the Niederreiter cryptosystem is a variation of the McEliece cryptosystem developed in 1986 by Harald Niederreiter. It applies the same...
    5 KB (675 words) - 02:49, 7 July 2023
  • Ronald Cramer and Victor Shoup in 1998, it is an extension of the ElGamal cryptosystem. In contrast to ElGamal, which is extremely malleable, Cramer–Shoup adds...
    7 KB (1,125 words) - 17:33, 23 July 2024
  • Based Encryption Boneh–Franklin Shamir, Adi (1985). "Identity-Based Cryptosystems and Signature Schemes" (PDF). In Blakley, George Robert; Chaum, David...
    7 KB (868 words) - 15:50, 7 December 2024
  • curve cryptography. David Naccache, inventor of the NaccacheStern cryptosystem and of the NaccacheStern knapsack cryptosystem. Moni Naor, co-inventor...
    22 KB (2,482 words) - 19:21, 23 June 2025
  • The Damgård–Jurik cryptosystem is a generalization of the Paillier cryptosystem. It uses computations modulo n s + 1 {\displaystyle n^{s+1}} where n {\displaystyle...
    4 KB (760 words) - 06:15, 16 January 2025
  • Thumbnail for Diffie–Hellman key exchange
    solve the Diffie–Hellman problem, making this and many other public key cryptosystems insecure. Fields of small characteristic may be less secure. The order...
    47 KB (5,306 words) - 14:45, 23 June 2025
  • The Benaloh Cryptosystem is an extension of the Goldwasser-Micali cryptosystem (GM) created in 1985 by Josh (Cohen) Benaloh. The main improvement of the...
    4 KB (751 words) - 11:00, 9 September 2020
  • Thumbnail for Web of trust
    RLWE-KEX RLWE-SIG Others AE CEILIDH EPOC HFE IES Lamport McEliece Merkle–Hellman NaccacheStern knapsack cryptosystem Three-pass protocol XTR SQIsign...
    24 KB (3,527 words) - 01:54, 19 June 2025
  • Thumbnail for Public key infrastructure
    RLWE-KEX RLWE-SIG Others AE CEILIDH EPOC HFE IES Lamport McEliece Merkle–Hellman NaccacheStern knapsack cryptosystem Three-pass protocol XTR SQIsign...
    35 KB (4,124 words) - 20:07, 8 June 2025
  • The Goldwasser–Micali (GM) cryptosystem is an asymmetric key encryption algorithm developed by Shafi Goldwasser and Silvio Micali in 1982. GM has the distinction...
    7 KB (976 words) - 18:47, 24 August 2023
  • The Schmidt-Samoa cryptosystem is an asymmetric cryptographic technique, whose security, like Rabin depends on the difficulty of integer factorization...
    2 KB (368 words) - 00:49, 18 June 2023
  • Thumbnail for Digital signature
    under an adaptive chosen message attack. All public key / private key cryptosystems depend entirely on keeping the private key secret. A private key can...
    45 KB (5,315 words) - 16:52, 11 April 2025
  • Equations (HFE), also known as HFE trapdoor function, is a public key cryptosystem which was introduced at Eurocrypt in 1996 and proposed by (in French)...
    14 KB (2,622 words) - 08:03, 9 February 2025