Algorithmica
A course in number theory and cryptography
A course in number theory and cryptography
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Distribution of digital contents based on public key considering execution speed and security
Information Sciences: an International Journal
Security enhancement for digital signature schemes with fault tolerance in RSA
Information Sciences: an International Journal
New directions in cryptography
IEEE Transactions on Information Theory
An improved algorithm for computing logarithms over and its cryptographic significance (Corresp.)
IEEE Transactions on Information Theory
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
Enhancing the security of quantum communication by hiding the message in a superposition
Information Sciences: an International Journal
Cryptanalysis of Álvarez et al. key exchange scheme
Information Sciences: an International Journal
Hi-index | 0.07 |
We propose a new key exchange scheme where the secret key is obtained by multiplying the powers of block upper triangular matrices. After studying the cryptographic properties of these block matrices, the theoretical aspects of this scheme are analyzed, concluding that common ciphertext attacks are not applicable to this cryptosystem. Moreover, our proposal is compared with the Diffie-Hellman scheme achieving satisfactory results.