Cryptosystems

Some articles on cryptosystems, cryptosystem:

Modern Cryptography - Cryptanalysis
... In a ciphertext-only attack, the cryptanalyst has access only to the ciphertext (good modern cryptosystems are usually effectively immune to ciphertext-on ... For this reason, public-key cryptosystems based on elliptic curves have become popular since their invention in the mid-1990s ... uses weaknesses in the algorithms themselves, other attacks on cryptosystems are based on actual use of the algorithms in real devices, and are called side-c ...
Homomorphic Encryption
... The homomorphic property of various cryptosystems can be used to create secure voting systems, collision-resistant hash functions, private information retrieval schemes and enable ... There are several efficient, partially homomorphic cryptosystems, and two fully homomorphic, but less efficient cryptosystems ... Although a cryptosystem which is unintentionally homomorphic can be subject to attacks on this basis, if treated carefully homomorphism can also be used to perform computations securely ...
NTRU Cryptosystems, Inc.
... Ntru Cryptosystems, Inc ... polynomial ring, or in mathematical notation which is the underlying ring in which the cryptosystem works ... Ntru Cryptosystems has developed and markets a Public-key cryptosystem ...
Hybrid Cryptosystem
... In cryptography, public-key cryptosystems are convenient in that they do not require the sender and receiver to share a common secret in order to communicate securely ... and are thus generally much more inefficient than comparable symmetric-key cryptosystems ... A hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem ...
Modern Cryptography - Cryptosystems
... more complex algorithm, called a cryptographic system, or cryptosystem ... Cryptosystems (e.g ... Cryptosystems use the properties of the underlying cryptographic primitives to support the system's security properties ...