You are looking at a specific version 20130503:082438 of this paper.
See the latest version.
Paper 2013/244
Cryptographic schemes, key exchange, public key.
Ted Hurley
Abstract
General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultaneously.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- general cryptographykey exchangepublic keywith coding
- Contact author(s)
- ted hurley @ nuigalway ie
- History
- 2013-05-03: received
- Short URL
- https://ia.cr/2013/244
- License
-
CC BY