Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme

Author(s):  
Jason H. M. Ying ◽  
Noboru Kunihiro
2009 ◽  
Vol 29 (7) ◽  
pp. 1779-1781
Author(s):  
Lian-hao LIU ◽  
Bu-yun QU

2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Reza Alimoradi

The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analyzed.


Author(s):  
Varsha Chauhan ◽  
Anuradha Sharma ◽  
Sandeep Sharma ◽  
Monika Yadav

Sign in / Sign up

Export Citation Format

Share Document