Subir material

Suba sus trabajos a SEDICI, para mejorar notoriamente su visibilidad e impacto

 

Mostrar el registro sencillo del ítem

dc.date.accessioned 2017-12-05T17:18:47Z
dc.date.available 2017-12-05T17:18:47Z
dc.date.issued 2017-10
dc.identifier.uri http://sedici.unlp.edu.ar/handle/10915/63938
dc.description.abstract Encrypted communications are performed using symmetric ciphers, which require asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously weakened after the presentation of Shor’s algorithm (1997) and others for quantum computers. New algorithms are generalized as post quantum cryptography. Asymmetric cryptography based on noncommutative algebra is a growing trend arising as a solid choice that strengthens these protocols. Hyper-complex numbers generated by the Cayley-Dickson construction forms non-commutative algebras. This paper focus on the use of these numbers in post-quantum cryptography. en
dc.format.extent 1299-1309 es
dc.language es es
dc.subject octonion's cipher en
dc.subject quaternion's cipher en
dc.subject non-commutative cryptography en
dc.title Post-Quantum Cryptography Using Hyper-Complex Numbers en
dc.type Objeto de conferencia es
sedici.identifier.isbn 978-950-34-1539-9 es
sedici.creator.person Kamlofsky, Jorge es
sedici.creator.person Hecht, Pedro es
sedici.description.note VI Workshop de Seguridad Informática (WSI). es
sedici.subject.materias Ciencias Informáticas es
sedici.description.fulltext true es
mods.originInfo.place Red de Universidades con Carreras en Informática (RedUNCI) es
sedici.subtype Objeto de conferencia es
sedici.rights.license Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
sedici.rights.uri http://creativecommons.org/licenses/by-nc-sa/4.0/
sedici.date.exposure 2017-10
sedici.relation.event XXIII Congreso Argentino de Ciencias de la Computación (La Plata, 2017). es
sedici.description.peerReview peer-review es


Descargar archivos

Este ítem aparece en la(s) siguiente(s) colección(ones)

Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) Excepto donde se diga explícitamente, este item se publica bajo la siguiente licencia Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)