Cryptographic algorithms on groups and algebras
From MaRDI portal
Publication:2399994
Recommendations
- A ``factorization algorithm for elements of a symmetric group
- scientific article; zbMATH DE number 1912011
- Aspects of nonabelian group based cryptography: a survey and open problems
- Application of non-associative structures to the construction of public key distribution algorithms
- scientific article; zbMATH DE number 7177933
Cites work
- scientific article; zbMATH DE number 3882549 (Why is no real title available?)
- scientific article; zbMATH DE number 3783206 (Why is no real title available?)
- scientific article; zbMATH DE number 1254290 (Why is no real title available?)
- scientific article; zbMATH DE number 1302783 (Why is no real title available?)
- scientific article; zbMATH DE number 978603 (Why is no real title available?)
- scientific article; zbMATH DE number 1440242 (Why is no real title available?)
- scientific article; zbMATH DE number 2203368 (Why is no real title available?)
- scientific article; zbMATH DE number 3273222 (Why is no real title available?)
- A characterisation result for matrix rings
- Anti-isomorphism of endomorphism rings of modules and Morita anti-equivalence
- Anti-isomorphisms of graded endomorphism rings of graded modules close to free ones.
- Antiisomorphisms of endomorphism rings of modules close to free ones which are induced by Morita antiequivalences
- Computing the structure of finite algebras
- Decomposition of algebras over finite fields and number fields
- Efficient decomposition of associative algebras over finite fields
- Efficient decomposition of separable algebras.
- Finite rings with applications.
- Hidden Matrices
- How to compute the Wedderburn decomposition of a finite-dimensional associative algebra.
- Inducing lattice maps by semilinear isomorphisms
- Isomorphisms between endomorphism rings of progenerators
- Isomorphisms of graded endomorphism rings of graded modules close to free ones.
- Isomorphisms of ring endomorphisms of modules that are close to free
- Lattice Isomorphisms between Modules (1) Endomorphism Rings∗
- Matrices, idealisers, and integer quaternions
- New directions in cryptography
- Non-isomorphic rings with isomorphic matrix rings
- On Rings for which Homogeneous Maps are Linear
- Recognition and computations of matrix rings
- Recognition of matrix rings
- Recognition of matrix rings. II
- Representation of tiled matrix rings as full matrix rings
Cited in
(34)- scientific article; zbMATH DE number 2144158 (Why is no real title available?)
- scientific article; zbMATH DE number 5781969 (Why is no real title available?)
- Monoidal categories, representation gap and cryptography
- A novel version of the hidden logarithm problem for post-quantum signature algorithms
- On new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groups
- Algebraic simplification and cryptographic motives.
- Comparing finite abelian groups from the standpoint of their cryptographic applications
- Discrete differentiations and integrations and their possible applications to algebra and cryptography
- Algebraic and quantum attacks on two digital signature schemes
- scientific article; zbMATH DE number 7259165 (Why is no real title available?)
- scientific article; zbMATH DE number 1912011 (Why is no real title available?)
- Digital signature scheme set in a hidden cyclic group
- scientific article; zbMATH DE number 7565360 (Why is no real title available?)
- Algebraic cryptography: new constructions and their security against provable break
- scientific article; zbMATH DE number 7259160 (Why is no real title available?)
- Research and synthesis of fractal structures for cryptographic algorithms
- Commutative encryption method based on hidden logarithm problem
- Cryptanalysis via algebraic spans
- Hypergroupoids and cryptosystems
- Finite non-commutative associative algebras for setting the hidden discrete logarithm problem and post-quantum cryptoschemes on its base
- Cryptosystems using linear groups
- Some cryptoprimitives in noncommutative algebraic cryptography
- Fractal magmas and public-key cryptography
- Applied homomorphic cryptography: examples
- Gaussian elimination in split unitary groups with an application to public-key cryptography
- General method for defining finite non-commutative associative algebras of dimension \(m>1\)
- Some new platforms for algebraic cryptography and one method of increasing the security
- Towards an operad-based cryptography: applications of commutative operads
- Combinatorial group theory and public key cryptography
- Victor Timofeevich Markov (21.06.1948 -- 15.07.2019)
- A new cryptosystem based on Lie algebra
- Group theory in cryptography
- A nonlinear decomposition method in analysis of some encryption schemes using group automorphisms
- Nonassociative algebras: some applications.
This page was built for publication: Cryptographic algorithms on groups and algebras
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2399994)