Algebraic generalization of Diffie-Hellman key exchange
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1617914 (Why is no real title available?)
- scientific article; zbMATH DE number 1643939 (Why is no real title available?)
- scientific article; zbMATH DE number 1722679 (Why is no real title available?)
- scientific article; zbMATH DE number 3941423 (Why is no real title available?)
- scientific article; zbMATH DE number 3948147 (Why is no real title available?)
- scientific article; zbMATH DE number 1186931 (Why is no real title available?)
- scientific article; zbMATH DE number 1186948 (Why is no real title available?)
- scientific article; zbMATH DE number 3751028 (Why is no real title available?)
- scientific article; zbMATH DE number 738921 (Why is no real title available?)
- scientific article; zbMATH DE number 1024494 (Why is no real title available?)
- scientific article; zbMATH DE number 1996402 (Why is no real title available?)
- scientific article; zbMATH DE number 1500484 (Why is no real title available?)
- scientific article; zbMATH DE number 1504559 (Why is no real title available?)
- scientific article; zbMATH DE number 1759768 (Why is no real title available?)
- scientific article; zbMATH DE number 1759777 (Why is no real title available?)
- scientific article; zbMATH DE number 2144676 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- A classifying invariant of knots, the knot quandle
- A decade of lattice cryptography
- A key-exchange system based on imaginary quadratic fields
- A new key exchange protocol based on the decomposition problem
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Algebraic generalization of Diffie-Hellman key exchange
- An algebraic method for public-key cryptography
- An efficient entire chaos-based scheme for deniable authentication
- An observation on associative one-way functions in complexity theory
- Authenticated key exchange from ideal lattices
- Automated deduction in equational logic and cubic curves
- Candidate Multilinear Maps from Ideal Lattices
- Characterization of security notions for probabilistic private-key encryption
- Combinatorial group theory and public key cryptography
- Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
- Cryptanalysis of GGH map
- Cryptanalysis of GGH15 multilinear maps
- Cryptanalysis of the Dickson-Scheme
- Cryptanalysis of the multilinear map over the integers
- Designing key transport protocols using combinatorial group theory
- Discrete logarithms in \(\mathrm{GF}(p)\)
- Efficient signature generation by smart cards
- Elliptic Curve Cryptosystems
- Graph-induced multilinear maps from lattices
- Hyperelliptic cryptosystems
- Idempotent medial \(n\)-groupoids defined on fields
- Introduction to Lie Algebras and Representation Theory
- Lattice cryptography for the internet
- Left conjugacy closed left quasigroups with pairwise distinct left translations
- Multilinear maps from obfuscation
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- New constructions of public-key encryption schemes from conjugacy search problems
- New directions in cryptography
- Nonmalleable Cryptography
- On beating the hybrid argument
- On lattices, learning with errors, random linear codes, and cryptography
- On the conjugacy search problem and left conjugacy closed loops
- On varieties of left distributive left idempotent groupoids
- Ouroboros: a simple, secure and efficient key exchange protocol based on coding theory
- Permutation polynomials in RSA-cryptosystems
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography
- Practical multilinear maps over the integers
- Provably secure password authenticated key exchange based on RLWE for the post-quantum world
- Public key cryptography based on semigroup actions
- Public key exchange using semidirect product of (semi)groups
- Quasigroups and cubic curves
- Random-Self-Reducibility of Complete Sets
- Secure communications over insecure channels
- Secure integration of asymmetric and symmetric encryption schemes
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
- Symmetric and Self-Distributive Systems
- The whole is less than the sum of its parts: constructing more efficient lattice-based AKEs
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Tropical Cryptography
Cited in
(11)- The key exchange protocol based on non-commutative elements of Clifford algebra
- Security of polynomial transformations of the Diffie-Hellman key.
- A key agreement protocol based on group actions
- Pseudo-free families and cryptographic primitives
- Algebraic properties of generalized Rijndael-like ciphers
- Algebraic generalization of Diffie-Hellman key exchange
- Algebraic aspects of key generation systems
- Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra
- Pseudo-free families of computational universal algebras
- An algebraic framework for Diffie-Hellman assumptions
- The Diffie-Hellman problem and generalization of Verheul's theorem
This page was built for publication: Algebraic generalization of Diffie-Hellman key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2413287)