Skip to main content

Research Repository

Advanced Search

Discrete Logarithms within Computer and Network Security.

Buchanan, William J



As we move into an Information Age, the requirement for computer security increases by the day, only in terms of privacy, but also in terms of proving identity and in verifying the integrity of data. Unfortunately many of the most widely used public key methods struggle against increasing computing power, and it is now becoming difficult to manage the ever increasing requirements for encryption keys. With logarithm cryptography, though, we have the scope to provide a bed rock of identity checking, key exchanges and for electronic signatures. This talk will thus provide an overview of how John Napier’s legacy is still an active, and growing, part of protecting our digital infrastructure, along with providing other areas where his legacy is still alive within networking.

Presentation Conference Type Other
Conference Name Napier 400 - Numerical Algorithms and Intelligent Software Symposium
Start Date Apr 1, 2014
End Date Apr 1, 2014
Publication Date 2014
Deposit Date May 28, 2014
Publicly Available Date Dec 31, 2014
Peer Reviewed Not Peer Reviewed
Public URL
Contract Date May 28, 2014


You might also like

Downloadable Citations