Header menu link for other important links
X
Efficient Authentication Scheme Based on the Twisted Near-Ring Root Extraction Problem
Published in Springer International Publishing
2018
Pages: 37 - 42
Abstract
An authentication protocol is a type of computer communication protocol or cryptography protocol precisely constructed for transferring authentication data between two entities. The aim of this chapter is to propose two new entity authentication schemes that work in the center of the near-ring. The security of the proposed schemes is dependent on the intractability of the twisted near-ring root extraction problem over the near-ring. © 2018, Springer Nature Switzerland AG.
About the journal
JournalData powered by TypesetTrends in Mathematics Advances in Algebra and Analysis
PublisherData powered by TypesetSpringer International Publishing
ISSN2297-0215
Open AccessNo