The Quartic Public Key Transformation

Reading time: 1 minute
...

📝 Original Info

  • Title: The Quartic Public Key Transformation
  • ArXiv ID: 1304.4273
  • Date: 2013-04-17
  • Authors: Researchers from original ArXiv paper

📝 Abstract

This paper presents the quartic public key transformation which can be used for public key applications if side information is also used. This extends an earlier work where the cubic transformation was similarly used. Such a transformation can be used in multiparty communications protocols.

💡 Deep Analysis

Deep Dive into The Quartic Public Key Transformation.

This paper presents the quartic public key transformation which can be used for public key applications if side information is also used. This extends an earlier work where the cubic transformation was similarly used. Such a transformation can be used in multiparty communications protocols.

📄 Full Content

This paper presents the quartic public key transformation which can be used for public key applications if side information is also used. This extends an earlier work where the cubic transformation was similarly used. Such a transformation can be used in multiparty communications protocols.

Reference

This content is AI-processed based on ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut