The Cubic Public-Key Transformation

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

9 pages; typographical errors corrected

Scientific paper

We propose the use of the cubic transformation for public-key applications and digital signatures. Transformations modulo a prime p or a composite n=pq, where p and q are primes, are used in such a fashion that each transformed value has only 3 roots that makes it a more efficient transformation than the squaring transformation of Rabin, which has 4 roots. Such a transformation, together with additional tag information, makes it possible to uniquely invert each transformed value. The method may be used for other exponents as well.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

The Cubic Public-Key Transformation does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with The Cubic Public-Key Transformation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and The Cubic Public-Key Transformation will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-388271

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.