Application of differential cryptography to a GN authentication hierarchy scheme
dc.contributor.author | Golumbeanu, Alin Ionut | |
dc.date.accessioned | 2022-03-21T14:15:41Z | |
dc.date.available | 2022-03-21T14:15:41Z | |
dc.date.issued | 2017-01-16 | |
dc.description.abstract | Starting from the classical differential cryptography, we describe how to construct particular parameters for elliptic curves with application to the domain of information security. These results conclude to a key used on symmetrical encryption. The article will review a solution in which the parties are authenticated based on a secret knowledge and a random parameter. | |
dc.description.department | Mathematics | |
dc.format | Text | |
dc.format.extent | 8 pages | |
dc.format.medium | 1 file (.pdf) | |
dc.identifier.citation | Golumbeanu, A. I. (2017). Application of differential cryptography to a GN authentication hierarchy scheme. Electronic Journal of Differential Equations, 2017(20), pp. 1-8. | |
dc.identifier.issn | 1072-6691 | |
dc.identifier.uri | https://hdl.handle.net/10877/15525 | |
dc.language.iso | en | |
dc.publisher | Texas State University, Department of Mathematics | |
dc.rights | Attribution 4.0 International | |
dc.rights.holder | This work is licensed under a Creative Commons Attribution 4.0 International License. | |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
dc.source | Electronic Journal of Differential Equations, 2017, San Marcos, Texas: Texas State University and University of North Texas. | |
dc.subject | Agreed session key | |
dc.subject | Elliptic curves | |
dc.subject | Public key based encryption | |
dc.subject | Identity based encryption | |
dc.title | Application of differential cryptography to a GN authentication hierarchy scheme | |
dc.type | Article |