Attacking a public key cryptosystem based on tree replacement
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 3910294 (Why is no real title available?)
- scientific article; zbMATH DE number 1955783 (Why is no real title available?)
- A D0L-T0L public key cryptosystem
- A public key cryptosystem based on Lyndon words
- A reaction attack on a public key cryptosystem based on the word problem
- Clouds over a public key cryptosystem based on Lyndon words
- New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups
- Pitfalls in public key cryptosystems based on free partially commutative monoids and groups
- Progress in Cryptology - INDOCRYPT 2003
- Reductions in tree replacement systems
- The complexity of Grigorchuk groups with application to cryptography
- Tree-Manipulating Systems and Church-Rosser Theorems
- Weak keys in MST\(_{1}\)
This page was built for publication: Attacking a public key cryptosystem based on tree replacement
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q858300)