Publications
July 19, 2023: URLs for CSRC publication details pages have changed. Legacy URLs should automatically redirect to the new URLs. However, links to the actual publications have NOT changed (e.g., DOIs and PDFs on nvlpubs.nist.gov). Please send inquiries to
csrc-inquiry@nist.gov. [12:20 pm ET - If you received "Page Not Found" errors recently, please retry accessing those files. File synchronization should now be complete.]
Withdrawn on June 23, 2015.
Public Key Cryptography
Documentation
Date Published: April 1991
Author(s)
James Nechvatal (NIST)
This publication presents a state-of-the-art survey of public-key cryptography, circa 1988-1990, and covers the following topics: 1) the theory of public-key cryptography; 2) comparisons to conventional (secret-key) cryptography; 3) a largely self-contained summary of relevant mathematics; 4) a survey of major existing public-key systems; 5) an exploration of digital signatures and has functions; 6) a survey of public-key implementations in networks; 7) an introduction to zero-knowledge protocols and probabilistic encryption; and 8) an exploration of security issues and key sizes.
This publication presents a state-of-the-art survey of public-key cryptography, circa 1988-1990, and covers the following topics: 1) the theory of public-key cryptography; 2) comparisons to conventional (secret-key) cryptography; 3) a largely self-contained summary of relevant mathematics; 4) a...
See full abstract
This publication presents a state-of-the-art survey of public-key cryptography, circa 1988-1990, and covers the following topics: 1) the theory of public-key cryptography; 2) comparisons to conventional (secret-key) cryptography; 3) a largely self-contained summary of relevant mathematics; 4) a survey of major existing public-key systems; 5) an exploration of digital signatures and has functions; 6) a survey of public-key implementations in networks; 7) an introduction to zero-knowledge protocols and probabilistic encryption; and 8) an exploration of security issues and key sizes.
Hide full abstract
Keywords
public-key cryptography
Control Families
None selected