1)Use of Braid Based cryptography for Low-Resource Computing Devices -
Algebraic eraser public key cryptosystem - All Algebraic Eraser protocols run in linear time in the key size, while all other systems,
including RSA and Diffie-Hellman protocols scale quadratically.