منابع مشابه
Elliptic Congruence Function Fields
Recently, the well-known Diie-Hellman key exchange protocol was extended to real quadratic congruence function elds in a non-group based setting. Here, the underlying key space was the set of reduced principal ideals. This set does not possess a group structure, but instead exhibits a so-called infrastructure. The techniques are the same as in the protocol based on real quadratic number elds. A...
متن کاملCryptography in Real Quadratic Congruence Function Fields
The Diffie-Hellman key exchange protocol as well as the ElGamal signature scheme are based on exponentiation modulo p for some prime p. Thus the security of these schemes is strongly tied to the difficulty of computing discrete logarithms in the finite field Fp. The Diffie-Hellman protocol has been generalized to other finite groups arising in number theory, and even to the sets of reduced prin...
متن کاملComputing discrete logarithms in real quadratic congruence function fields of large genus
The discrete logarithm problem in various finite abelian groups is the basis for some well known public key cryptosystems. Recently, real quadratic congruence function fields were used to construct a public key distribution system. The security of this public key system is based on the difficulty of a discrete logarithm problem in these fields. In this paper, we present a probabilistic algorith...
متن کاملcontrol of the optical properties of nanoparticles by laser fields
در این پایان نامه، درهمتنیدگی بین یک سیستم نقطه کوانتومی دوگانه(مولکول نقطه کوانتومی) و میدان مورد مطالعه قرار گرفته است. از آنتروپی ون نیومن به عنوان ابزاری برای بررسی درهمتنیدگی بین اتم و میدان استفاده شده و تاثیر پارامترهای مختلف، نظیر تونل زنی(که توسط تغییر ولتاژ ایجاد می شود)، شدت میدان و نسبت دو گسیل خودبخودی بر رفتار درجه درهمتنیدگی سیستم بررسی شده اشت.با تغییر هر یک از این پارامترها، در...
15 صفحه اولKey-Exchange in Real Quadratic Congruence Function Fields
We show how the theory of real quadratic congruence function fields can be used to produce a secure key distribution protocol. The technique is similar to that advocated by Diffie and Hellman in 1976, but instead of making use of a group for its underlying structure, makes use of a structure which is “almost” a group. The method is an extension of the recent ideas of Scheidler, Buchmann and Wil...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Finite Fields and Their Applications
سال: 2017
ISSN: 1071-5797
DOI: 10.1016/j.ffa.2016.10.001