Public-key cryptography using paraunitary matrices.
Farshid DelgoshaFaramarz FekriPublished in: IEEE Trans. Signal Process. (2006)
Keyphrases
- public key cryptography
- public key
- elliptic curve
- authentication and key agreement
- digital signature
- security services
- elliptic curve cryptography
- public key infrastructure
- provably secure
- security model
- security analysis
- key management
- real time
- diffie hellman
- secret key
- security requirements
- similarity measure
- web services