Article ID Journal Published Year Pages File Type
9492939 Finite Fields and Their Applications 2005 30 Pages PDF
Abstract
As a second topic we consider a different, even faster set-up. The idea is to use a τ-adic expansion as the key instead of starting with an integer which is then expanded. We show that this approach has similar security and is especially suited for restricted devices as the requirements to perform the operations are reduced to a minimum.
Related Topics
Physical Sciences and Engineering Mathematics Algebra and Number Theory
Authors
,