Cryptology ePrint Archive: Report 2013/244

Cryptographic schemes, key exchange, public key.

Ted Hurley

Abstract: General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultaneously.

Category / Keywords: implementation / general cryptography, key exchange, public key, with coding

Date: received 30 Apr 2013

Contact author: ted hurley at nuigalway ie

Available format(s): PDF | BibTeX Citation

Version: 20130503:082438 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]