scispace - formally typeset
Search or ask a question

Showing papers on "PKCS #1 published in 1996"


Book
01 Jan 1996
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Abstract: From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper.

13,597 citations


Journal ArticleDOI
TL;DR: The authors' method is based on a unique factorisation theorem, which combines with Derome's method and allows the generation of RSA keys without using the Euclidean algorithm.
Abstract: The authors present a parallel implementation for generating RSA keys without using the Euclidean algorithm. Their method is based on a unique factorisation theorem, which combines with Derome's method and allows the generation of RSA keys without using the Euclidean algorithm.

53 citations


BookDOI
01 Jan 1996

48 citations


Book ChapterDOI
10 Apr 1996
TL;DR: This paper summarizes the current activities of the IEEE P1363 working group, developing standards for public-key cryptography based on RSA and Diffie-Hellman algorithm families and on elliptic curve systems.
Abstract: The IEEE P1363 working group is developing standards for public-key cryptography based on RSA and Diffie-Hellman algorithm families and on elliptic curve systems. This paper summarizes the current activities of that group.

8 citations


Journal ArticleDOI
TL;DR: It is argued that although the law has yet to catch up with developments in cryptography, when it does cryptography will be central to electronic file management.
Abstract: Cryptography and related terminology is defined. The design and operation of an encryption algorithm is examined in detail, using the example of DES (Data Encryption Standard). Public key cryptosystems based on the Diffie‐Hellman and RSA (Rivest, Shamir and Adleman) models are described and their revolutionary nature made clear. The necessity for trusted public keys with RSA is explained. Applications in records management are given in sections on storage and transmission. The latter type further breaks down into mail and file transfer/EDI (Electronic Data Interchange) areas of use. Some novel applications are proposed (for example a virtual records centre). A conclusion argues that although the law has yet to catch up with developments in cryptography, when it does cryptography will be central to electronic file management.

1 citations



Proceedings Article
01 Jan 1996

1 citations