Search among the 160581 resources available in the repository
dc.date.accessioned | 2017-12-05T17:18:47Z | |
dc.date.available | 2017-12-05T17:18:47Z | |
dc.date.issued | 2017-10 | |
dc.identifier.uri | http://sedici.unlp.edu.ar/handle/10915/63938 | |
dc.description.abstract | Encrypted communications are performed using symmetric ciphers, which require asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously weakened after the presentation of Shor’s algorithm (1997) and others for quantum computers. New algorithms are generalized as post quantum cryptography. Asymmetric cryptography based on noncommutative algebra is a growing trend arising as a solid choice that strengthens these protocols. Hyper-complex numbers generated by the Cayley-Dickson construction forms non-commutative algebras. This paper focus on the use of these numbers in post-quantum cryptography. | en |
dc.format.extent | 1299-1309 | es |
dc.language | es | es |
dc.subject | octonion's cipher | en |
dc.subject | quaternion's cipher | en |
dc.subject | non-commutative cryptography | en |
dc.title | Post-Quantum Cryptography Using Hyper-Complex Numbers | en |
dc.type | Objeto de conferencia | es |
sedici.identifier.isbn | 978-950-34-1539-9 | es |
sedici.creator.person | Kamlofsky, Jorge | es |
sedici.creator.person | Hecht, Pedro | es |
sedici.description.note | VI Workshop de Seguridad Informática (WSI). | es |
sedici.subject.materias | Ciencias Informáticas | es |
sedici.description.fulltext | true | es |
mods.originInfo.place | Red de Universidades con Carreras en Informática (RedUNCI) | es |
sedici.subtype | Objeto de conferencia | es |
sedici.rights.license | Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) | |
sedici.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | |
sedici.date.exposure | 2017-10 | |
sedici.relation.event | XXIII Congreso Argentino de Ciencias de la Computación (La Plata, 2017). | es |
sedici.description.peerReview | peer-review | es |