Cryptographic schemes, key exchange, public key

0Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.

Abstract

General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultaneously.

Author supplied keywords

Cite

CITATION STYLE

APA

Hurley, T. (2014). Cryptographic schemes, key exchange, public key. International Journal of Pure and Applied Mathematics, 93(6), 897–927. https://doi.org/10.12732/ijpam.v93i6.13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free