Post-Quantum Cryptography Using Hyper-Complex Numbers
Encrypted communications are performed using symmetric ciphers, which require asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously weakened after the presentation of Shor’s algorithm (1997) and others for quantum computers. New algorithms are generalized as post quantum...
Autores principales: | , |
---|---|
Formato: | Objeto de conferencia |
Lenguaje: | Español |
Publicado: |
2017
|
Materias: | |
Acceso en línea: | http://sedici.unlp.edu.ar/handle/10915/63938 |
Aporte de: | Aportado por :
SEDICI (UNLP) de
Universidad Nacional de La Plata .
|
id |
I19-R120-10915-63938 |
---|---|
record_format |
dspace |
institution |
Universidad Nacional de La Plata |
institution_str |
I-19 |
repository_str |
R-120 |
collection |
SEDICI (UNLP) |
language |
Español |
topic |
Ciencias Informáticas octonion's cipher quaternion's cipher non-commutative cryptography |
spellingShingle |
Ciencias Informáticas octonion's cipher quaternion's cipher non-commutative cryptography Kamlofsky, Jorge Hecht, Pedro Post-Quantum Cryptography Using Hyper-Complex Numbers |
topic_facet |
Ciencias Informáticas octonion's cipher quaternion's cipher non-commutative cryptography |
description |
Encrypted communications are performed using symmetric ciphers, which require asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously weakened after the presentation of Shor’s algorithm (1997) and others for quantum computers. New algorithms are generalized as post quantum cryptography. Asymmetric cryptography based on noncommutative algebra is a growing trend arising as a solid choice that strengthens these protocols. Hyper-complex numbers generated by the Cayley-Dickson construction forms non-commutative algebras. This paper focus on the use of these numbers in post-quantum cryptography. |
format |
Objeto de conferencia Objeto de conferencia |
author |
Kamlofsky, Jorge Hecht, Pedro |
author_facet |
Kamlofsky, Jorge Hecht, Pedro |
author_sort |
Kamlofsky, Jorge |
title |
Post-Quantum Cryptography Using Hyper-Complex Numbers |
title_short |
Post-Quantum Cryptography Using Hyper-Complex Numbers |
title_full |
Post-Quantum Cryptography Using Hyper-Complex Numbers |
title_fullStr |
Post-Quantum Cryptography Using Hyper-Complex Numbers |
title_full_unstemmed |
Post-Quantum Cryptography Using Hyper-Complex Numbers |
title_sort |
post-quantum cryptography using hyper-complex numbers |
publishDate |
2017 |
url |
http://sedici.unlp.edu.ar/handle/10915/63938 |
work_keys_str_mv |
AT kamlofskyjorge postquantumcryptographyusinghypercomplexnumbers AT hechtpedro postquantumcryptographyusinghypercomplexnumbers |
bdutipo_str |
Repositorios |
_version_ |
1764820479480168448 |