Application of differential cryptography to a GN authentication hierarchy scheme

dc.contributor.authorGolumbeanu, Alin Ionut
dc.date.accessioned2022-03-21T14:15:41Z
dc.date.available2022-03-21T14:15:41Z
dc.date.issued2017-01-16
dc.description.abstractStarting from the classical differential cryptography, we describe how to construct particular parameters for elliptic curves with application to the domain of information security. These results conclude to a key used on symmetrical encryption. The article will review a solution in which the parties are authenticated based on a secret knowledge and a random parameter.
dc.description.departmentMathematics
dc.formatText
dc.format.extent8 pages
dc.format.medium1 file (.pdf)
dc.identifier.citationGolumbeanu, A. I. (2017). Application of differential cryptography to a GN authentication hierarchy scheme. Electronic Journal of Differential Equations, 2017(20), pp. 1-8.
dc.identifier.issn1072-6691
dc.identifier.urihttps://hdl.handle.net/10877/15525
dc.language.isoen
dc.publisherTexas State University, Department of Mathematics
dc.rightsAttribution 4.0 International
dc.rights.holderThis work is licensed under a Creative Commons Attribution 4.0 International License.
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.sourceElectronic Journal of Differential Equations, 2017, San Marcos, Texas: Texas State University and University of North Texas.
dc.subjectAgreed session key
dc.subjectElliptic curves
dc.subjectPublic key based encryption
dc.subjectIdentity based encryption
dc.titleApplication of differential cryptography to a GN authentication hierarchy scheme
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
golumbeanu.pdf
Size:
242.35 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.54 KB
Format:
Item-specific license agreed upon to submission
Description: