Post-Quantum Cryptography Using Hyper-Complex Numbers

J Kamlofsky, P Hecht - XXIII Congreso Argentino de Ciencias de …, 2017 - sedici.unlp.edu.ar
Encrypted communications are performed using symmetric ciphers, which require
asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously …

[PDF][PDF] Post-Quantum Cryptography Using Hyper-Complex Numbers

JAKJP Hecht - academia.edu
Encrypted communications are performed using symmetric ciphers, which require
asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously …

Une généralisation des octonions

M Kreusch - Séminaire interne des doctorants en sciences …, 2013 - orbi.uliege.be
[en] Voir la pièce jointe Disciplines: Mathematics Author, co-author: Kreusch, Marie;
Université de Liège-ULiège> Département de mathématique> Géométrie et théorie des …