Design of public key cryptosystems using idempotent elements

Józef P. Pieprzyk*, Dominik A. Rutkowski

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

The description of a new method of designing a public key cryptosystem using idempotent elements is given. This method is connected with the Merkle-Hellman method and is illustrated by three versions of the design that show the properties of the cryptosystem obtained and its advantages as compared to the cryptosystem of Merkle-Hellman.

Original languageEnglish
Pages (from-to)297-308
Number of pages12
JournalComputers and Security
Volume4
Issue number4
DOIs
Publication statusPublished - 1985
Externally publishedYes

Keywords

  • Cryptography
  • Enciphering algorithms
  • Encryption
  • Knapsack Cipher
  • Public key cryptosystems

Fingerprint Dive into the research topics of 'Design of public key cryptosystems using idempotent elements'. Together they form a unique fingerprint.

Cite this