Non-associative public-key cryptography
From MaRDI portal
Publication:2975249
DOI10.1090/conm/677/13623zbMath1380.94103arXiv1210.8270OpenAlexW1612731896MaRDI QIDQ2975249
Publication date: 11 April 2017
Published in: Algebra and Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1210.8270
Related Items (3)
Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra ⋮ Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography ⋮ An improvement of the Diffie-Hellman noncommutative protocol
Uses Software
Cites Work
- Probabilistic solutions of equations in the braid group.
- Latin squares. New developments in the theory and applications
- A new authentication scheme based on latin squares
- The Magma algebra system. I: The user language
- Non-Abelian key agreement protocols
- Braids and self-distributivity
- An algebraic method for public-key cryptography
- Cryptanalysis via algebraic spans
- Quasigroups in cryptology
- Combinatorial group theory and public key cryptography
- The conjugacy search problem in public key cryptography: unnecessary and insufficient
- Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography
- Left symmetric left distributive operations on a group.
- Non-associative key establishment protocols and their implementation
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Elliptic Curve Cryptosystems
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- A Note on the Shifted Conjugacy Problem in Braid Groups
- Non-associative key establishment for left distributive systems
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Non-associative public-key cryptography