Implementation of a Key Exchange Protocol Using Real Quadratic Fields

نویسندگان

  • Renate Scheidler
  • Johannes A. Buchmann
  • Hugh C. Williams
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptography in Real Quadratic Congruence Function Fields

The Diffie-Hellman key exchange protocol as well as the ElGamal signature scheme are based on exponentiation modulo p for some prime p. Thus the security of these schemes is strongly tied to the difficulty of computing discrete logarithms in the finite field Fp. The Diffie-Hellman protocol has been generalized to other finite groups arising in number theory, and even to the sets of reduced prin...

متن کامل

Key-Exchange in Real Quadratic Congruence Function Fields

We show how the theory of real quadratic congruence function fields can be used to produce a secure key distribution protocol. The technique is similar to that advocated by Diffie and Hellman in 1976, but instead of making use of a group for its underlying structure, makes use of a structure which is “almost” a group. The method is an extension of the recent ideas of Scheidler, Buchmann and Wil...

متن کامل

Implementation of quadratic dose protocol for 18F-FDG whole-body PET imaging using a BGO-based PET/CT scanner, GE Discovery ST

Introduction: The ability of quadratic dose protocol to maintain a good quality image for an overweight and obese patient is well reported. However, a practical approach to the implementation of this protocol in whole-body imaging in Malaysia is currently lacking. Hence, the aim of this study is to derive the quadratic dose formula that suits our PET system. Metho...

متن کامل

Aaliation of Authors Key-exchange in Real Quadratic Congruence Function Fields

We show how the theory of real quadratic congruence function elds can be used to produce a secure key distribution protocol. The technique is similar to that advocated by Diie and Hellman in 1976, but instead of making use of a group for its underlying structure, makes use of a structure which is \almost" a group. The method is an extension of the recent ideas of Scheidler, Buchmann and William...

متن کامل

The Efficiency and Security of a Real Quadratic Field Based-Key Exchange Protocol

Most cryptographic key exchange protocols make use of the presumed difficulty of solving the discrete logarithm problem (DLP) in a certain finite group as the basis of their security. Recently, real quadratic number fields have been proposed for use in the development of such protocols. Breaking such schemes is known to be at least as difficult a problem as integer factorization; furthermore, t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001