| Article ID | Journal | Published Year | Pages | File Type |
|---|---|---|---|---|
| 9492939 | Finite Fields and Their Applications | 2005 | 30 Pages |
Abstract
As a second topic we consider a different, even faster set-up. The idea is to use a Ï-adic expansion as the key instead of starting with an integer which is then expanded. We show that this approach has similar security and is especially suited for restricted devices as the requirements to perform the operations are reduced to a minimum.
Related Topics
Physical Sciences and Engineering
Mathematics
Algebra and Number Theory
Authors
Tanja Lange,
