Abstract. This paper introduces the XTR public key system. XTR is based on a new method to represent elements of a subgroup of a multiplicative group of a finite field. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead without compromising security.
The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Gi...
We describe a new general method to perform part of the setup stage of the XTR system introduced at ...
We analyze and critique the public-key cryptosystem, based on combinatorial group theory, that was ...
This paper introduces the XTR public key system. XTR is based on a new method to represent elements ...
This paper describes improved methods for XTR key representation and parameter generation (cf. [4])....
The definition of XTR system, which is based on the elements' trace compact denotation in the s...
In this paper, we propose novel deterministic and probabilistic public key cryptographic schemes bas...
XTR is an excellent public key system that can achieve the same communication and security advantage...
The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Gi...
We describe a new general method to perform part of the setup stage of the XTR system introduced at ...
We analyze and critique the public-key cryptosystem, based on combinatorial group theory, that was ...
This paper introduces the XTR public key system. XTR is based on a new method to represent elements ...
This paper describes improved methods for XTR key representation and parameter generation (cf. [4])....
The definition of XTR system, which is based on the elements' trace compact denotation in the s...
In this paper, we propose novel deterministic and probabilistic public key cryptographic schemes bas...
XTR is an excellent public key system that can achieve the same communication and security advantage...
The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Gi...
We describe a new general method to perform part of the setup stage of the XTR system introduced at ...
We analyze and critique the public-key cryptosystem, based on combinatorial group theory, that was ...