118.5K
Publications
6.6M
Citations
167.6K
Authors
11.7K
Institutions
Public-Key Cryptography Foundations
1975 - 1990
The period saw the rise and consolidation of public-key cryptography and probabilistic encryption as the foundation for secure digital interactions, enabling practical key exchange, digital signatures, and trusted identities in distributed networks. Researchers developed robust secure network protocols and encryption mechanisms that address authentication, confidentiality, and data integrity over insecure channels, establishing frameworks for public-key infrastructures and secure communications across the Internet. The emphasis on randomness and probabilistic constructs deepened understanding of cryptographic strength, with formal results on pseudorandom generation and the security properties of encryption schemes. Data-centric security concerns began to shape approaches to privacy in statistical databases and information-flow control in distributed systems.
• Public-key cryptography (PKC) and digital signatures underpin trust in distributed interactions, shaping PKI, signature schemes, and algebraic constructions for secure identity and data integrity [1], [4], [9], [15].
• Secure network communications and protocol mechanisms address authentication, confidentiality, and integrity over insecure channels, fusing encryption, secure access, and high-level protocol protections [2], [3], [5], [12], [13].
• Foundations of cryptographic strength emphasize randomness and probabilistic constructs—pseudorandom generation and encryption schemes—forming the bedrock of secure encryption and analysis of key robustness [4], [16], [17].
• Security in data-centric environments emphasizes protecting statistical databases and enforcing information-flow constraints in distributed systems, guiding data privacy and access control [8], [11], [18].
Popular Keywords
Side-Channel Aware Protocols
1991 - 1997
Universally Composable Security
1998 - 2004
Attribute-Based Data Sharing
2005 - 2010
Privacy-Preserving Encrypted Cloud Computing
2011 - 2017
Privacy-Preserving IoT-Cloud Security
2018 - 2024