Security of public key cryptosystems based on Chebyshev Polynomials
Pina BergamoPaolo D'ArcoAlfredo De SantisLjupco KocarevPublished in: CoRR (2004)
Keyphrases
- public key cryptosystems
- modular exponentiation
- elliptic curve cryptography
- elliptic curve
- encryption scheme
- wireless sensor networks
- key distribution
- security requirements
- network security
- security policies
- security issues
- security protocols
- key exchange
- intrusion detection
- access control
- error correction
- security analysis
- information security
- authentication scheme
- mobile agents