Application of differential cryptography to a GN authentication hierarchy scheme
MetadataShow full metadata
Starting from the classical differential cryptography, we describe how to construct particular parameters for elliptic curves with application to the domain of information security. These results conclude to a key used on symmetrical encryption. The article will review a solution in which the parties are authenticated based on a secret knowledge and a random parameter.
CitationGolumbeanu, A. I. (2017). Application of differential cryptography to a GN authentication hierarchy scheme. Electronic Journal of Differential Equations, 2017(20), pp. 1-8.
This work is licensed under a Creative Commons Attribution 4.0 International License.