1999
DOI: 10.1007/bf02885019
|View full text |Cite
|
Sign up to set email alerts
|

The generalization of public key cryptosystem FAPKC4

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2000
2000
2016
2016

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…But this modification was also broken by Meskanen [8]. Finally, Tao Renji, Chen Shihua, and Chen Xuemei introduced FAPKC4 [9]. Other cryptosystems based on Mealy machines can be found [10,11].…”
Section: Related Workmentioning
confidence: 99%
“…But this modification was also broken by Meskanen [8]. Finally, Tao Renji, Chen Shihua, and Chen Xuemei introduced FAPKC4 [9]. Other cryptosystems based on Mealy machines can be found [10,11].…”
Section: Related Workmentioning
confidence: 99%
“…These kinds of cryptosystems are computationally expensive in time as well as in space, their security relies on a very small set of problems, and improvements in algorithms to solve these problems have led to the necessity of increasing the size of the keys, which leads to higher computational costs. In a series of papers [10][11][12][13], Tao introduced a family of cryptosystems based on finite transducers, named FAPKCs. These schemes seem to be a good alternative to the classical ones, since they are computationally attractive and thus suitable for application on devices with very limited computational resources, such as satellites, cellular phones, sensor networks, and smart cards [11].…”
Section: Introductionmentioning
confidence: 99%
“…A finite transducer is called linear if its transition and output functions are linear maps. Linear finite transducers play a core role in a family of cryptosystems, named FAPKCs, introduced in a series of papers by Tao [11,14,12,13]. Those schemes seem to be a good alternative to the classical ones, being computationally attractive and thus suitable for application on devices with very limited computational resources, such as satellites, cellular phones, sensor networks, and smart cards [12].…”
Section: Introductionmentioning
confidence: 99%