Paper 2013/244

Cryptographic schemes, key exchange, public key.

Ted Hurley

Abstract

General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultaneously.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Keywords
general cryptographykey exchangepublic keywith coding
Contact author(s)
ted hurley @ nuigalway ie
History
2013-05-03: received
Short URL
https://ia.cr/2013/244
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/244,
      author = {Ted Hurley},
      title = {Cryptographic schemes, key exchange, public key.},
      howpublished = {Cryptology ePrint Archive, Paper 2013/244},
      year = {2013},
      note = {\url{https://eprint.iacr.org/2013/244}},
      url = {https://eprint.iacr.org/2013/244}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.