This paper introduces the XTR public key system. XTR is based on a new method for representing elements of a subgroup of a multiplicative group of a finite field. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead without compromising securit
In this chapter we introduce the basic building blocks for cryptography based on the discrete logari...
© 2020 by the authors.In the context of new threats to Public Key Cryptography arising from a growin...
The Discrete Log Problem (DLP), that is computing x, given y = alpha(x) and (alpha) = G subset of F-...
This paper introduces the XTR public key system. XTR is based on a new method to represent elements ...
This paper describes improved methods for XTR key representation and parameter generation (cf. [4])....
The definition of XTR system, which is based on the elements' trace compact denotation in the s...
XTR is an excellent public key system that can achieve the same communication and security advantage...
In this paper, we propose novel deterministic and probabilistic public key cryptographic schemes bas...
Encryption algorithms have been used since the dawn of time to ensure secure communication over inse...
Secret sharing was proposed primarily in 1979 to solve the problem of key distribution. In recent de...
We describe a new general method to perform part of the setup stage of the XTR system introduced at ...
Published version of a paper presented at the ARES '10 International Conference on Availability, Rel...
We offer a public key exchange protocol in the spirit of Diffie-Hellman, but we use (small) matrices...
In this chapter we introduce the basic building blocks for cryptography based on the discrete logari...
© 2020 by the authors.In the context of new threats to Public Key Cryptography arising from a growin...
The Discrete Log Problem (DLP), that is computing x, given y = alpha(x) and (alpha) = G subset of F-...
This paper introduces the XTR public key system. XTR is based on a new method to represent elements ...
This paper describes improved methods for XTR key representation and parameter generation (cf. [4])....
The definition of XTR system, which is based on the elements' trace compact denotation in the s...
XTR is an excellent public key system that can achieve the same communication and security advantage...
In this paper, we propose novel deterministic and probabilistic public key cryptographic schemes bas...
Encryption algorithms have been used since the dawn of time to ensure secure communication over inse...
Secret sharing was proposed primarily in 1979 to solve the problem of key distribution. In recent de...
We describe a new general method to perform part of the setup stage of the XTR system introduced at ...
Published version of a paper presented at the ARES '10 International Conference on Availability, Rel...
We offer a public key exchange protocol in the spirit of Diffie-Hellman, but we use (small) matrices...
In this chapter we introduce the basic building blocks for cryptography based on the discrete logari...
© 2020 by the authors.In the context of new threats to Public Key Cryptography arising from a growin...
The Discrete Log Problem (DLP), that is computing x, given y = alpha(x) and (alpha) = G subset of F-...