Key exchange protocols over noncommutative rings. The case of
From MaRDI portal
Publication:4903468
DOI10.1080/00207160.2012.696105zbMath1277.94020OpenAlexW2094686359MaRDI QIDQ4903468
Pedro R. Navarro, Joan-Josep Climent, Leandro Tortosa
Publication date: 22 January 2013
Published in: International Journal of Computer Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/00207160.2012.696105
Related Items
Public key protocols over the ring \(E_{p}^{(m)}\), On some class of formal matrix ring, The "Elliptic" matrices and a new kind of cryptography, Unnamed Item, On the algebraic structure of \(E_p^{(m)}\) and applications to cryptography, An extension of the noncommutative Bergman's ring with a large number of noninvertible elements, A key exchange protocol using matrices over group ring, Signature scheme using the root extraction problem on quaternions
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On the arithmetic of the endomorphisms ring \(\text{End}(\mathbb Z_p\times\mathbb Z_{p^2})\).
- Group-based cryptography
- Towards generating secure keys for braid cryptography
- An algebraic method for public-key cryptography
- Analysis and design of a secure key exchange scheme
- A nonlinear elliptic curve cryptosystem based on matrices
- Some examples in PI ring theory
- Cryptanalysis of Stickel’s Key Exchange Scheme
- Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials
- A Non-abelian Group Based on Block Upper Triangular Matrices with Cryptographic Applications
- A public key cryptosystem and a signature scheme based on discrete logarithms
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Weakness in quaternion signatures