A cryptography method employing a new mathematical paradigm for public keys schemes
- Autores
- Ribeiro, Vinicius Gadis; Weber, Raul Fernando
- Año de publicación
- 2004
- Idioma
- inglés
- Tipo de recurso
- artículo
- Estado
- versión publicada
- Descripción
- blic Keys Schemes usually generate two pairs of keys that bear some mathematical relation-usually, a relation of the field known as Number Theory. Identifying a key from another that is given is a problem of great difficulty. This paper presents a public key scheme in wich such key identification is also a great difficulty problem-however, the mathematical problem does not fall under Number Theory; rather, it is one of Differential equations, the rules of Lie groups being the best solution. Even using Lie groups, a problem of great difficulty still remains. The first few examples use Maple 5.0, a symbolic processing program, and are available in an Internet site.
Facultad de Informática - Materia
-
Ciencias Informáticas
Public key cryptosystems
criptografía
symbolic processing - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- http://creativecommons.org/licenses/by-nc/3.0/
- Repositorio
- Institución
- Universidad Nacional de La Plata
- OAI Identificador
- oai:sedici.unlp.edu.ar:10915/9498
Ver los metadatos del registro completo
id |
SEDICI_3fc46d121f7049eccec7d19c046ab432 |
---|---|
oai_identifier_str |
oai:sedici.unlp.edu.ar:10915/9498 |
network_acronym_str |
SEDICI |
repository_id_str |
1329 |
network_name_str |
SEDICI (UNLP) |
spelling |
A cryptography method employing a new mathematical paradigm for public keys schemesRibeiro, Vinicius GadisWeber, Raul FernandoCiencias InformáticasPublic key cryptosystemscriptografíasymbolic processingblic Keys Schemes usually generate two pairs of keys that bear some mathematical relation-usually, a relation of the field known as Number Theory. Identifying a key from another that is given is a problem of great difficulty. This paper presents a public key scheme in wich such key identification is also a great difficulty problem-however, the mathematical problem does not fall under Number Theory; rather, it is one of Differential equations, the rules of Lie groups being the best solution. Even using Lie groups, a problem of great difficulty still remains. The first few examples use Maple 5.0, a symbolic processing program, and are available in an Internet site.Facultad de Informática2004-10info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionArticulohttp://purl.org/coar/resource_type/c_6501info:ar-repo/semantics/articuloapplication/pdf157-162http://sedici.unlp.edu.ar/handle/10915/9498enginfo:eu-repo/semantics/altIdentifier/url/http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Oct04-6.pdfinfo:eu-repo/semantics/altIdentifier/issn/1666-6038info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc/3.0/Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-10-15T10:43:17Zoai:sedici.unlp.edu.ar:10915/9498Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-10-15 10:43:17.719SEDICI (UNLP) - Universidad Nacional de La Platafalse |
dc.title.none.fl_str_mv |
A cryptography method employing a new mathematical paradigm for public keys schemes |
title |
A cryptography method employing a new mathematical paradigm for public keys schemes |
spellingShingle |
A cryptography method employing a new mathematical paradigm for public keys schemes Ribeiro, Vinicius Gadis Ciencias Informáticas Public key cryptosystems criptografía symbolic processing |
title_short |
A cryptography method employing a new mathematical paradigm for public keys schemes |
title_full |
A cryptography method employing a new mathematical paradigm for public keys schemes |
title_fullStr |
A cryptography method employing a new mathematical paradigm for public keys schemes |
title_full_unstemmed |
A cryptography method employing a new mathematical paradigm for public keys schemes |
title_sort |
A cryptography method employing a new mathematical paradigm for public keys schemes |
dc.creator.none.fl_str_mv |
Ribeiro, Vinicius Gadis Weber, Raul Fernando |
author |
Ribeiro, Vinicius Gadis |
author_facet |
Ribeiro, Vinicius Gadis Weber, Raul Fernando |
author_role |
author |
author2 |
Weber, Raul Fernando |
author2_role |
author |
dc.subject.none.fl_str_mv |
Ciencias Informáticas Public key cryptosystems criptografía symbolic processing |
topic |
Ciencias Informáticas Public key cryptosystems criptografía symbolic processing |
dc.description.none.fl_txt_mv |
blic Keys Schemes usually generate two pairs of keys that bear some mathematical relation-usually, a relation of the field known as Number Theory. Identifying a key from another that is given is a problem of great difficulty. This paper presents a public key scheme in wich such key identification is also a great difficulty problem-however, the mathematical problem does not fall under Number Theory; rather, it is one of Differential equations, the rules of Lie groups being the best solution. Even using Lie groups, a problem of great difficulty still remains. The first few examples use Maple 5.0, a symbolic processing program, and are available in an Internet site. Facultad de Informática |
description |
blic Keys Schemes usually generate two pairs of keys that bear some mathematical relation-usually, a relation of the field known as Number Theory. Identifying a key from another that is given is a problem of great difficulty. This paper presents a public key scheme in wich such key identification is also a great difficulty problem-however, the mathematical problem does not fall under Number Theory; rather, it is one of Differential equations, the rules of Lie groups being the best solution. Even using Lie groups, a problem of great difficulty still remains. The first few examples use Maple 5.0, a symbolic processing program, and are available in an Internet site. |
publishDate |
2004 |
dc.date.none.fl_str_mv |
2004-10 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion Articulo http://purl.org/coar/resource_type/c_6501 info:ar-repo/semantics/articulo |
format |
article |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://sedici.unlp.edu.ar/handle/10915/9498 |
url |
http://sedici.unlp.edu.ar/handle/10915/9498 |
dc.language.none.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
info:eu-repo/semantics/altIdentifier/url/http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Oct04-6.pdf info:eu-repo/semantics/altIdentifier/issn/1666-6038 |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess http://creativecommons.org/licenses/by-nc/3.0/ Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0) |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc/3.0/ Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0) |
dc.format.none.fl_str_mv |
application/pdf 157-162 |
dc.source.none.fl_str_mv |
reponame:SEDICI (UNLP) instname:Universidad Nacional de La Plata instacron:UNLP |
reponame_str |
SEDICI (UNLP) |
collection |
SEDICI (UNLP) |
instname_str |
Universidad Nacional de La Plata |
instacron_str |
UNLP |
institution |
UNLP |
repository.name.fl_str_mv |
SEDICI (UNLP) - Universidad Nacional de La Plata |
repository.mail.fl_str_mv |
alira@sedici.unlp.edu.ar |
_version_ |
1846063847440384000 |
score |
13.22299 |