Goldwasser and Micali (J Comput Syst Sci 28(2):270–299, 1984) highlighted the importance of randomizing the plaintext for public-key encryption and introduced the notion of semantic security. They also realized a cryptosystem meeting this security notion under the standard complexity assumption of deciding quadratic residuosity modulo a composite number. The Goldwasser–Micali cryptosystem is simple and elegant but is quite wasteful in bandwidth when encrypting large messages. A number of works followed to address this issue and proposed various modifications. This paper revisits the original Goldwasser–Micali cryptosystem using 2k-th power residue symbols. The so-obtained cryptosystems appear as a very natural generalization for k=2 (the ca...
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For...
This paper proposes a public key cryptosystem using a reciprocal number. Breaking the proposed crypt...
Local pseudorandom generators are a class of fundamental cryptographic primitives having very broad ...
International audienceGoldwasser and Micali (1984) highlighted the importance of randomizing the pla...
Goldwasser and Micali (J Comput Syst Sci 28(2):270–299, 1984) highlighted the importance of randomiz...
We present a novel public key encryption scheme that enables users to exchange many bits messages by...
The $e$-th power residue symbol $\left(\frac{\alpha}{\mathfrak{p}}\right)_e$ is a useful mathematica...
This thesis deals with two main matters of modern public key cryptography: provable security and eff...
Abstract. Motivated by the quest for reducing assumptions in security proofs in cryptography, this p...
This paper proposes new symmetric cryptoalgorithms of Residue Number System and its Modified Perfect...
Cryptography is the art of secret writing. There are essentially two types of cryptosystems. (i) Sec...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Abstract: Problem statement: A cryptosystem is a way for a sender and a receiver to communicate digi...
Number representation systems establish ways in which numbers are mapped to computer architectures, ...
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For...
This paper proposes a public key cryptosystem using a reciprocal number. Breaking the proposed crypt...
Local pseudorandom generators are a class of fundamental cryptographic primitives having very broad ...
International audienceGoldwasser and Micali (1984) highlighted the importance of randomizing the pla...
Goldwasser and Micali (J Comput Syst Sci 28(2):270–299, 1984) highlighted the importance of randomiz...
We present a novel public key encryption scheme that enables users to exchange many bits messages by...
The $e$-th power residue symbol $\left(\frac{\alpha}{\mathfrak{p}}\right)_e$ is a useful mathematica...
This thesis deals with two main matters of modern public key cryptography: provable security and eff...
Abstract. Motivated by the quest for reducing assumptions in security proofs in cryptography, this p...
This paper proposes new symmetric cryptoalgorithms of Residue Number System and its Modified Perfect...
Cryptography is the art of secret writing. There are essentially two types of cryptosystems. (i) Sec...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Abstract: Problem statement: A cryptosystem is a way for a sender and a receiver to communicate digi...
Number representation systems establish ways in which numbers are mapped to computer architectures, ...
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For...
This paper proposes a public key cryptosystem using a reciprocal number. Breaking the proposed crypt...
Local pseudorandom generators are a class of fundamental cryptographic primitives having very broad ...