IJPAM: Volume 93, No. 6 (2014)


Ted Hurley
School of Mathematics, Statistics & Applied Mathematics
National University of Ireland Galway
University Road, Galway, IRELAND

Abstract. General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultaneously.

Received: May 27, 2014

AMS Subject Classification: 15A99, 94A60

Key Words and Phrases: cryptography, key exchange, one-time

Download paper from here.

DOI: 10.12732/ijpam.v93i6.13 How to cite this paper?

International Journal of Pure and Applied Mathematics
ISSN printed version: 1311-8080
ISSN on-line version: 1314-3395
Year: 2014
Volume: 93
Issue: 6
Pages: 897 -

CC BY This work is licensed under the Creative Commons Attribution International License (CC BY).