Cryptographic schemes, key exchange, public key

@article{Hurley2013CryptographicSK,
  title={Cryptographic schemes, key exchange, public key},
  author={Ted Hurley},
  journal={IACR Cryptology ePrint Archive},
  year={2013},
  volume={2013},
  pages={244}
}
  • Ted Hurley
  • Published 2013 in IACR Cryptology ePrint Archive
General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and… CONTINUE READING