Login / Signup
An applications of signed quadratic residues in public key cryptography.
Pinkimani Goswami
Madan Mohan Singh
Published in:
Discret. Math. Algorithms Appl. (2018)
Keyphrases
</>
public key cryptography
public key
elliptic curve
provably secure
authentication and key agreement
digital signature
security model
public key infrastructure
elliptic curve cryptography
security services
computational complexity
signature scheme
standard model
real time
secret key
security analysis
diffie hellman
third party
wireless networks
low cost
similarity measure