Computer Science – Cryptography and Security
Scientific paper
2006-02-28
Circuits Systems and Signal Processing, vol 26, pp. 353-359, 2007
Computer Science
Cryptography and Security
9 pages; typographical errors corrected
Scientific paper
We propose the use of the cubic transformation for public-key applications and digital signatures. Transformations modulo a prime p or a composite n=pq, where p and q are primes, are used in such a fashion that each transformed value has only 3 roots that makes it a more efficient transformation than the squaring transformation of Rabin, which has 4 roots. Such a transformation, together with additional tag information, makes it possible to uniquely invert each transformed value. The method may be used for other exponents as well.
No associations
LandOfFree
The Cubic Public-Key Transformation does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with The Cubic Public-Key Transformation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and The Cubic Public-Key Transformation will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-388271