Cryptographic algorithms on groups and algebras
DOI10.1007/S10958-017-3371-YzbMATH Open1371.94645OpenAlexW2610968218MaRDI QIDQ2399994FDOQ2399994
Authors: Aleksey Kuzmin, Victor Markov, A. A. Mikhalev, A. V. Mikhalev, Alexander Nechaev
Publication date: 25 August 2017
Published in: Journal of Mathematical Sciences (New York) (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10958-017-3371-y
Recommendations
- A ``factorization algorithm for elements of a symmetric group
- scientific article; zbMATH DE number 1912011
- Aspects of nonabelian group based cryptography: a survey and open problems
- Application of non-associative structures to the construction of public key distribution algorithms
- scientific article; zbMATH DE number 7177933
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Computational aspects of associative rings (general theory) (16Z05) Abstract finite groups (20D99)
Cites Work
- Title not available (Why is that?)
- New directions in cryptography
- Title not available (Why is that?)
- Finite rings with applications.
- Title not available (Why is that?)
- Title not available (Why is that?)
- Efficient decomposition of associative algebras over finite fields
- How to compute the Wedderburn decomposition of a finite-dimensional associative algebra.
- Efficient decomposition of separable algebras.
- Computing the structure of finite algebras
- Title not available (Why is that?)
- On Rings for which Homogeneous Maps are Linear
- Isomorphisms between endomorphism rings of progenerators
- Lattice Isomorphisms between Modules (1) Endomorphism Rings∗
- Inducing lattice maps by semilinear isomorphisms
- Decomposition of algebras over finite fields and number fields
- Title not available (Why is that?)
- Matrices, idealisers, and integer quaternions
- Recognition of matrix rings
- Representation of tiled matrix rings as full matrix rings
- Non-isomorphic rings with isomorphic matrix rings
- Hidden Matrices
- A characterisation result for matrix rings
- Recognition and computations of matrix rings
- Recognition of matrix rings. II
- Title not available (Why is that?)
- Isomorphisms of graded endomorphism rings of graded modules close to free ones.
- Antiisomorphisms of endomorphism rings of modules close to free ones which are induced by Morita antiequivalences
- Anti-isomorphisms of graded endomorphism rings of graded modules close to free ones.
- Isomorphisms of ring endomorphisms of modules that are close to free
- Anti-isomorphism of endomorphism rings of modules and Morita anti-equivalence
- Title not available (Why is that?)
Cited In (34)
- Digital signature scheme set in a hidden cyclic group
- Title not available (Why is that?)
- General method for defining finite non-commutative associative algebras of dimension \(m>1\)
- Combinatorial group theory and public key cryptography
- Title not available (Why is that?)
- Hypergroupoids and cryptosystems
- Monoidal categories, representation gap and cryptography
- Title not available (Why is that?)
- Group theory in cryptography
- Nonassociative algebras: some applications.
- Title not available (Why is that?)
- Finite non-commutative associative algebras for setting the hidden discrete logarithm problem and post-quantum cryptoschemes on its base
- Algebraic simplification and cryptographic motives.
- Some new platforms for algebraic cryptography and one method of increasing the security
- A new cryptosystem based on Lie algebra
- A novel version of the hidden logarithm problem for post-quantum signature algorithms
- Commutative encryption method based on hidden logarithm problem
- On new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groups
- Title not available (Why is that?)
- Gaussian elimination in split unitary groups with an application to public-key cryptography
- Towards an operad-based cryptography: applications of commutative operads
- Title not available (Why is that?)
- Some cryptoprimitives in noncommutative algebraic cryptography
- Algebraic cryptography: new constructions and their security against provable break
- Fractal magmas and public-key cryptography
- Victor Timofeevich Markov (21.06.1948 -- 15.07.2019)
- Cryptosystems using linear groups
- Comparing finite abelian groups from the standpoint of their cryptographic applications
- Discrete differentiations and integrations and their possible applications to algebra and cryptography
- Algebraic and quantum attacks on two digital signature schemes
- Research and synthesis of fractal structures for cryptographic algorithms
- A nonlinear decomposition method in analysis of some encryption schemes using group automorphisms
- Cryptanalysis via algebraic spans
- Applied homomorphic cryptography: examples
This page was built for publication: Cryptographic algorithms on groups and algebras
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2399994)