Cryptology ePrint Archive: Report 2013/244
Cryptographic schemes, key exchange, public key.
Ted Hurley
Abstract: General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement.
The schemes may be integrated with error-correcting coding schemes
so that encryption/coding and decryption/decoding may
be done simultaneously.
Category / Keywords: implementation / general cryptography, key exchange, public key, with coding
Date: received 30 Apr 2013
Contact author: ted hurley at nuigalway ie
Available format(s): PDF | BibTeX Citation
Version: 20130503:082438 (All versions of this report)
Short URL: ia.cr/2013/244
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]