An applications of signed quadratic residues in public key cryptography.
Pinkimani GoswamiMadan Mohan SinghPublished in: Discret. Math. Algorithms Appl. (2018)
Keyphrases
- public key cryptography
- public key
- elliptic curve
- provably secure
- authentication and key agreement
- digital signature
- security model
- public key infrastructure
- elliptic curve cryptography
- security services
- computational complexity
- signature scheme
- standard model
- real time
- secret key
- security analysis
- diffie hellman
- third party
- wireless networks
- low cost
- similarity measure