M ASTER S OFTWARE QUALITY SOFTWARE SINCE 1958 |
THE QUADRATIC AND DOUBLE QUADRATIC RESIDUE CIPHERS
Quadratic Residue ciphers are compared to the RSA Public Key Cryptosystem |
MESSAGE AUTHENTICATION USING QUADRATIC RESIDUES
Uses a new one-way hashing function based on quadratic residues |
DESIGNING A HIGH-SECURITY CIPHER
A step by step approach to designing a strong stream cipher |
A MULTIPLE-SIGNATURE PROTOCOL FOR PUBLIC-KEY CRYPTOSYSTEMS
Creates a digital signature that only the authorized signers could produce |
ONE-TIME PAD CRYPTOGRAPHY
A practical way to achieve near-perfect security |
Device, System and Method for Fast Secure Encryption of Bulk Data Files
Theory underlying the MX-Crypt matrix encryption patents (2007 manuscript) |
Send us an email for any comments or questions about
our cryptographic products. |