×

A type of public cryptosystem using polynomials and Pell sequences. (English) Zbl 1506.94020


MSC:

94A60 Cryptography
11B39 Fibonacci and Lucas numbers and polynomials and generalizations
Full Text: DOI

References:

[1] Buchman, Introduction to cryptography, Springer-verlag
[2] Koblitz, Neal “A course in number theory and cryptography” IBSN 3-578071-8 SPIN 10893308. · Zbl 0819.11001
[3] Rosen, K. H., Elementary number theory and its applications, Addson Wesly · Zbl 0964.11002
[4] Basin, S. L., Generalized Fibonacci Sequences and Squared Rectangles, The American Mathematical Monthly, 70, 4, 372-379 (1963) · Zbl 0118.27902 · doi:10.1080/00029890.1963.11987595
[5] Abdullah, K. (2010). Comparison between the RSA cryptosystem and elliptic curve cryptography (Thesis, Master of Science (MSc)). The University of Waikato, Hamilton, New Zealand.
[6] Piper, Fred; Murthy, Sean, Cryptography: A very short introduction, E.H.Lock Wood, Math, Gazette, 51, 243-244 (1967) · doi:10.2307/3613247
[7] Koshy, T., Fibonacci and Lucas and Pell numbers and pascal’s triangle with Applications (2001), John Wiley: John Wiley, New York · Zbl 0984.11010
[8] Zhao, Feng-Zhen; Wang, Tianming, The values of a class of series involving generalized Fibonacci and Lucas numbers, International Journal of Mathematical Education in Science and Technology (2005)
[9] ChandraSekhar, A.; ChayaKumari, D.; Pragathi, Ch.; Ashok Kumar, S., Multiple Encryptions of Fibonacci Lucas transformations, International Organization of Scientific Research (IOST), 12, 2, 66-72 (2016)
[10] Dr. Chayakumari, D.; Dr. Ashok Kumar, S.; Triveni, D., super-encryption method of laplace transformations using fibonacci numbers, Journal of Huazhong University of Science and Technology, 50, 7
[11] Sekhar, A. Chandra, Linearly independent spanning sets and linear transformations for Multi-level Encryption, Journal of Information and Optimization Sciences, 36, 4, 385-392 (2015) · doi:10.1080/02522667.2014.961821
[12] Mittal, Gaurav; Kumar, Sunil; Narain, Shiv; Kumar, Sandeep, Group ring based public key cryptosystems, Journal of Discrete Mathematical Sciences and Cryptography (2021) · Zbl 1498.94076
[13] Dasdemir, Ahmet., On the Pell, Pell-Lucas and modified Pell numbers by matrix method, Applied Mathematical Sciences, 5.64, 3173-3181 (2011) · Zbl 1244.11015
[14] Horadam, A. F., Applications of modified Pell numbers to representations, Ulam Quarterly, 3.1, 34-53 (1994) · Zbl 0874.11023
[15] Çelik, Songül; Durukan, İnan; Özkan, Engin, New recurrences on Pell numbers, Pell-Lucas numbers, Jacobsthal numbers, and Jacobsthal-Lucas numbers, Chaos, Solitons & Fractals, 150, 111173 (2021) · Zbl 1489.11025 · doi:10.1016/j.chaos.2021.111173
[16] Yagmur, Tulay; Karaaslan, Nusret, Gaussian modified Pell sequence and Gaussian modified Pell polynomial sequence, Aksaray University Journal of Science and Engineering, 2.1, 63-72 (2018)
[17] Horadam, A. F.; Mahon, J. M., Pell and pell-lucas polynomials, Fibonacci Quart, 23.1, 7-20 (1985) · Zbl 0557.10011
[18] Karaaslan, Nusret., A note on modified Pell polynomials, Aksaray University Journal of Science and Engineering, 3.1, 1-7 (2019)
[19] Halici, Serpil., On the Pell polynomials, Sci, 5.37, 1833-1838 (2011) · Zbl 1258.11023
[20] Aziz, Semaa Hassan; Shihab, Suha; Rasheed, Mohammed, On Some Properties of Pell Polynomials, Al-Qadisiyah Journal of Pure Science, 26.1, 39-54 (2021)
[21] Kızılateş, Can; Kirlak, Selihan, A new generalization of Fibonacci and Lucas type sedenions, Journal of Discrete Mathematical Sciences and Cryptography (2022)
[22] Ramakrishna, Mathe; Atukuri, V.; Devireddy, Srinivasa Kumar, Securing information: cryptography and steganography, International Journal of Computer Science and Information Technologies, 3.3, 4251-4255 (2012)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.