Signature scheme using the root extraction problem on quaternions
From MaRDI portal
Publication:2336748
DOI10.1155/2014/819182zbMATH Open1442.94048OpenAlexW2121745151WikidataQ59052598 ScholiaQ59052598MaRDI QIDQ2336748FDOQ2336748
Publication date: 19 November 2019
Published in: Journal of Applied Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1155/2014/819182
Recommendations
- A digital signature scheme based on the root extraction problem on a matrix ring
- Weakness in quaternion signatures
- New signature scheme based on difficulty of finding roots
- scientific article; zbMATH DE number 1494170
- Public key encryption and signature schemes based on polynomials over \(\mathbb{Z}_n\)
Cites Work
- An algebraic method for public-key cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol
- A Survey of Public-Key Cryptosystems
- Title not available (Why is that?)
- Non-commutative digital signatures
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- A Practical Attack on a Braid Group Based Cryptographic Protocol
- Title not available (Why is that?)
- Key exchange protocols over noncommutative rings. The case of
- A public key cryptosystem based on non-abelian finite groups
- New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups
- Title not available (Why is that?)
- Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux Key Agreement Protocol
- Computer network security. 5th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2010, St. Petersburg, Russia, September 8--10, 2010. Proceedings
- Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials
- Weak keys in MST\(_{1}\)
- An efficient solution of the congruence<tex>x^2 + ky^2 = mpmod{n}</tex>
- Weakness in quaternion signatures
- Cryptanalysis of the MST 3 public key cryptosystem
- A note on the security of \(\text{MST} _{3}\)
- Non-Abelian key agreement protocols
- Title not available (Why is that?)
- Title not available (Why is that?)
- Generalized Learning Problems and Applications to Non-commutative Cryptography
- A linear time matrix key agreement protocol over small finite fields
- Cryptanalysis of Álvarez et al. key exchange scheme
- Security Analysis of the MOR Cryptosystem
- Title not available (Why is that?)
- Conjugate adjoining problem in braid groups and new design of braid-based signatures
- On the Security of MOR Public Key Cryptosystem
- Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups
Cited In (4)
This page was built for publication: Signature scheme using the root extraction problem on quaternions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2336748)