In 2000, Paulus and Takagi introduced a public key cryptosystem called NICE that exploits the relationship between maximal and non-maximal orders in imaginary quadratic number fields. Relying on the intractability of integer factorization, NICE provides a similar level of security as RSA, but has faster decryption. This paper presents REAL-NICE, an adaptation of NICE to orders in real quadratic fields. REAL-NICE supports smaller public keys than NICE, and while preliminary computations suggest that it is somewhat slower than NICE, it still significantly outperforms RSA in decryption
In this article, we investigate the class of multivariate quadratic (MQ) public key systems. These ...
Imaginary quadratic fields were first suggested as a setting for public-key cryptography by Buchmann...
Abstract: This paper presents a key-private public-key cryptosystem. More specifically, in addition ...
International audienceWe present a new algorithm based on binary quadratic forms to factor integers ...
International audienceWe present a new algorithm based on binary quadratic forms to factor integers ...
In this doctoral thesis, we propose three public-key cryptosystems with fast decryption function: th...
We present a new cryptosystem based on ideal arithmetic in quadratic orders. The method of our trapd...
Recently, a new public-key cryptosystem constructed on number fields is presented. The prominent the...
We describe the first polynomial time chosen-plaintext to-tal break of the NICE family of cryptosyst...
This paper proposes a public key cryptosystem using a reciprocal number. Breaking the proposed crypt...
In [14] and [21] there are proposed ElGamal-type cryptosystems based on non-maximal imaginary quadra...
In this paper, for given N = pq with p and q different odd primes, and m = 1, 2, · · · , we give ...
We introduce a new cryptosystem with trapdoor decryption based on the difficulty of computing discre...
The RSA public-key cryptosystem has a major role in information security even today, after more than...
Abstract. To date, the only non-group structure that has been suitably employed as the key space for...
In this article, we investigate the class of multivariate quadratic (MQ) public key systems. These ...
Imaginary quadratic fields were first suggested as a setting for public-key cryptography by Buchmann...
Abstract: This paper presents a key-private public-key cryptosystem. More specifically, in addition ...
International audienceWe present a new algorithm based on binary quadratic forms to factor integers ...
International audienceWe present a new algorithm based on binary quadratic forms to factor integers ...
In this doctoral thesis, we propose three public-key cryptosystems with fast decryption function: th...
We present a new cryptosystem based on ideal arithmetic in quadratic orders. The method of our trapd...
Recently, a new public-key cryptosystem constructed on number fields is presented. The prominent the...
We describe the first polynomial time chosen-plaintext to-tal break of the NICE family of cryptosyst...
This paper proposes a public key cryptosystem using a reciprocal number. Breaking the proposed crypt...
In [14] and [21] there are proposed ElGamal-type cryptosystems based on non-maximal imaginary quadra...
In this paper, for given N = pq with p and q different odd primes, and m = 1, 2, · · · , we give ...
We introduce a new cryptosystem with trapdoor decryption based on the difficulty of computing discre...
The RSA public-key cryptosystem has a major role in information security even today, after more than...
Abstract. To date, the only non-group structure that has been suitably employed as the key space for...
In this article, we investigate the class of multivariate quadratic (MQ) public key systems. These ...
Imaginary quadratic fields were first suggested as a setting for public-key cryptography by Buchmann...
Abstract: This paper presents a key-private public-key cryptosystem. More specifically, in addition ...