The following pages link to (Q3101433):
Displaying 44 items.
- Authenticated commutator key agreement protocol (Q338834) (← links)
- The status of polycyclic group-based cryptography: a survey and open problems (Q338844) (← links)
- A nonlinear decomposition attack (Q338847) (← links)
- Linear decomposition method in analyzing hidden information protocols on algebraic platforms (Q498303) (← links)
- Undeniable signature scheme based over group ring (Q505668) (← links)
- Cryptanalysis of a key exchange protocol based on the endomorphisms ring \(\mathrm{End}(\mathbb Z_p\times\mathbb Z_{p^2})\) (Q694564) (← links)
- Generic case completeness (Q736607) (← links)
- Randomness and complexity in matrix groups (Q822669) (← links)
- Reidemeister classes and twisted inner representations. (Q891361) (← links)
- Knapsack problems in products of groups (Q898247) (← links)
- Algorithmic problems in right-angled Artin groups: complexity and applications (Q1628497) (← links)
- Analysis of secret sharing schemes based on Nielsen transformations (Q1647857) (← links)
- Analysis of a key exchange protocol based on tropical matrix algebra (Q1787191) (← links)
- Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra (Q2032302) (← links)
- Attack on Kayawood protocol: uncloaking private keys (Q2033519) (← links)
- LWE from non-commutative group rings (Q2068391) (← links)
- Linear groups and computation (Q2292421) (← links)
- An improved version of the AAG cryptographic protocol (Q2304870) (← links)
- Conjugacy search problem and the Andrews-Curtis conjecture (Q2305693) (← links)
- Two general schemes of algebraic cryptography (Q2317165) (← links)
- An attack on the Walnut digital signature algorithm (Q2324764) (← links)
- Conjugacy systems based on nonabelian factorization problems and their applications in cryptography (Q2336603) (← links)
- Some new platforms for algebraic cryptography and one method of increasing the security (Q2361683) (← links)
- Enhanced matrix power function for cryptographic primitive construction (Q2415047) (← links)
- Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography (Q2516526) (← links)
- Positive elements and sufficient conditions for solvability of the submonoid membership problem for nilpotent groups of class two (Q2676823) (← links)
- Asymptotic Density and the Theory of Computability: A Partial Survey (Q2970976) (← links)
- Non-associative key establishment protocols and their implementation (Q2975250) (← links)
- Using Semidirect Product of (Semi)groups in Public Key Cryptography (Q3188249) (← links)
- Solving the Conjugacy Decision Problem via Machine Learning (Q4960480) (← links)
- Algorithmic problems in Engel groups and cryptographic applications (Q5124360) (← links)
- (Q5150520) (← links)
- (Q5150533) (← links)
- (Q5150587) (← links)
- CRYPTANALYSIS OF USHAKOV — SHPILRAIN’S AUTHENTICATION PROTOCOL BASED ON THE TWISTED CONJUGACY PROBLEM (Q5150685) (← links)
- GENERAL ALGEBRAIC CRYPTOGRAPHIC KEY EXCHANGE SCHEME AND ITS CRYPTANALYSIS (Q5151070) (← links)
- A key exchange protocol using matrices over group ring (Q5193476) (← links)
- Knapsack problems in groups (Q5496223) (← links)
- Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family (Q5859674) (← links)
- SOLENOIDAL MAPS, AUTOMATIC SEQUENCES, VAN DER PUT SERIES, AND MEALY AUTOMATA (Q5870871) (← links)
- On Eulerian semigroups of multivariate transformations and their cryptographic applications (Q6055054) (← links)
- Undecidability of the submonoid membership problem for free nilpotent group of class $l\geqslant 2$ of sufficiently large rank (Q6085106) (← links)
- Monoidal categories, representation gap and cryptography (Q6151519) (← links)
- On new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groups (Q6185599) (← links)