Public key authentication scheme over quaternions
From MaRDI portal
Publication:5035018
Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Linear algebraic groups over the reals, the complexes, the quaternions (20G20) Finite fields and commutative rings (number-theoretic aspects) (11T99) Authentication, digital signatures and secret sharing (94A62)
Recommendations
Cites work
- scientific article; zbMATH DE number 1617914 (Why is no real title available?)
- scientific article; zbMATH DE number 5380259 (Why is no real title available?)
- scientific article; zbMATH DE number 3948147 (Why is no real title available?)
- scientific article; zbMATH DE number 176555 (Why is no real title available?)
- scientific article; zbMATH DE number 1759777 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- A modification of the RSA public-key encryption procedure (Corresp.)
- A new multiparty identification scheme based on nearring root extraction problem
- A public key cryptosystem and a signature scheme based on discrete logarithms
- An algebraic method for public-key cryptography
- Authentication from matrix conjugation
- Efficient signature generation by smart cards
- Elliptic Curve Cryptosystems
- Entity authentication schemes using braid word reduction
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- New directions in cryptography
- Non-Abelian key agreement protocols
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Signature scheme using the root extraction problem on quaternions
- Some Public-Key Crypto-Functions as Intractable as Factorization
- Zero-knowledge proofs of identity
This page was built for publication: Public key authentication scheme over quaternions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5035018)