Authenticated commutator key agreement protocol
From MaRDI portal
Publication:338834
DOI10.1515/gcc-2016-0011zbMath1353.94076OpenAlexW2530764790MaRDI QIDQ338834
Publication date: 7 November 2016
Published in: Groups, Complexity, Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/gcc-2016-0011
Symbolic computation and algebraic computation (68W30) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Authentication schemes from actions on graphs, groups, or rings
- Group-based cryptography
- Zero-knowledge proofs of identity
- An algebraic method for public-key cryptography
- Combinatorial group theory.
- Protocols for authentification and key establishment
- The conjugacy search problem in public key cryptography: unnecessary and insufficient
- Entity authentication schemes using braid word reduction
- Strong law of large numbers on graphs and groups
- Mean-set attack: cryptanalysis of Sibert et al. authentication protocol
- Group theory in cryptography
- Random subgroups and analysis of the length-based and quotient attacks
- Thompson’s Group and Public Key Cryptography
- New directions in cryptography
- A Practical Attack on Some Braid Group Based Cryptographic Primitives
- Authentication from Matrix Conjugation
- A Practical Attack on a Braid Group Based Cryptographic Protocol
- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol
- Public Key Cryptography - PKC 2006
This page was built for publication: Authenticated commutator key agreement protocol