Some applications of idempotent semirings in public key cryptography.
Mariana DurchevaPublished in: ACM Commun. Comput. Algebra (2015)
Keyphrases
- public key cryptography
- public key
- elliptic curve
- constraint satisfaction problems
- public key infrastructure
- digital signature
- authentication and key agreement
- security services
- provably secure
- security model
- elliptic curve cryptography
- key management
- security analysis
- secret key
- efficient computation
- diffie hellman
- cost effective
- wireless sensor networks
- information systems