Ironwood meta key agreement and authentication protocol
From MaRDI portal
Publication:2025376
DOI10.3934/amc.2020073zbMath1464.94026arXiv1702.02450OpenAlexW3015596313MaRDI QIDQ2025376
Dorian Goldfeld, Derek Atkins, Iris Lee Anshel, Paul E. Gunnells
Publication date: 12 May 2021
Published in: Advances in Mathematics of Communications (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1702.02450
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A class of hash functions based on the Algebraic Eraser\(^{\text{TM}}\)
- \(\mathrm{SL}_2\) homomorphic hash functions: worst case to average case reduction and short collision search
- Short expressions of permutations as products and cryptanalysis of the algebraic eraser
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
- Group-based cryptography
- An algebraic method for public-key cryptography
- A new approach to the conjugacy problem in Garside groups.
- Theory of braids
- A Practical Cryptanalysis of the Algebraic Eraser
- Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux Key Agreement Protocol
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- A Practical Attack on Some Braid Group Based Cryptographic Primitives
This page was built for publication: Ironwood meta key agreement and authentication protocol