Cryptographic schemes, key exchange, public key

Ted Hurley

Research output: Contribution to a Journal (Peer & Non Peer)Articlepeer-review

Abstract

General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultaneously.

Original languageEnglish
Pages (from-to)897-927
Number of pages31
JournalInternational Journal of Pure and Applied Mathematics
Volume93
Issue number6
DOIs
Publication statusPublished - 2014

Keywords

  • Cryptography
  • Key exchange
  • One-time

Fingerprint

Dive into the research topics of 'Cryptographic schemes, key exchange, public key'. Together they form a unique fingerprint.

Cite this