Towards generating secure keys for braid cryptography
DOI10.1007/S10623-007-9123-0zbMATH Open1178.94193OpenAlexW1990825084MaRDI QIDQ1008952FDOQ1008952
Authors: Ki Hyoung Ko, Jang Won Lee, Tony Thomas
Publication date: 31 March 2009
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-007-9123-0
Recommendations
Cryptography (94A60) Braid groups; Artin groups (20F36) Word problems, other decision problems, connections with logic and automata (group-theoretic aspects) (20F10)
Cites Work
- Title not available (Why is that?)
- Conjugacy problem for braid groups and Garside groups.
- The infimum, supremum, and geodesic length of a braid conjugacy class.
- An algebraic method for public-key cryptography
- A Practical Attack on Some Braid Group Based Cryptographic Primitives
- Title not available (Why is that?)
- Title not available (Why is that?)
- Entity authentication schemes using braid word reduction
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- A Practical Attack on a Braid Group Based Cryptographic Protocol
- THE BRAID GROUP AND OTHER GROUPS
- ALGORITHMS FOR POSITIVE BRAIDS
- Conjugacy in Garside groups. I: Cyclings, powers and rigidity.
- A new approach to the conjugacy problem in Garside groups.
- Title not available (Why is that?)
- Conjugacy search in braid groups. From a braid-based cryptogrphy point of view
- A weak key test for braid based cryptography.
Cited In (22)
- On the algebraic structure of \(E_p^{(m)}\) and applications to cryptography
- A Practical Attack on Some Braid Group Based Cryptographic Primitives
- Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography
- Cryptanalysis of the shifted conjugacy authentication protocol
- ALGEBRAIC BRAID GROUP PUBLIC KEY CRYPTOGRAPHY
- Title not available (Why is that?)
- Title not available (Why is that?)
- Conjugacy search in braid groups. From a braid-based cryptogrphy point of view
- Title not available (Why is that?)
- Public Key Cryptography - PKC 2006
- Groups with two generators having unsolvable word problem and presentations of Mihailova subgroups of braid groups
- The root extraction problem in braid group-based cryptography
- New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups
- Transitive Signatures from Braid Groups
- Title not available (Why is that?)
- Title not available (Why is that?)
- Public key protocols over the ring \(E_{p}^{(m)}\)
- Representation attacks on the Braid Diffie-Hellman public key encryption
- Title not available (Why is that?)
- A weak key test for braid based cryptography.
- A public key encryption algorithm on braid groups
- Key exchange protocols over noncommutative rings. The case of End(\(\mathbb Z_p \times \mathbb Z_{p^{2}}\))
Uses Software
This page was built for publication: Towards generating secure keys for braid cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1008952)