A nonlinear decomposition attack
From MaRDI portal
Publication:338847
DOI10.1515/gcc-2016-0017zbMath1353.94071OpenAlexW4231372666MaRDI QIDQ338847
Publication date: 7 November 2016
Published in: Groups, Complexity, Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/gcc-2016-0017
polycyclic groupgroup-based cryptography(non)linear decomposition attackDiffie-Hellman protocolkey agreement protocol
Related Items (9)
Cryptanalysis of a combinatorial public key cryptosystem ⋮ On Eulerian semigroups of multivariate transformations and their cryptographic applications ⋮ Algebraic cryptanalysis and new security enhancements ⋮ GENERAL ALGEBRAIC CRYPTOGRAPHIC KEY EXCHANGE SCHEME AND ITS CRYPTANALYSIS ⋮ A NONLINEAR DECOMPOSITION METHOD IN ANALYSIS OF SOME ENCRYPTION SCHEMES USING GROUP AUTOMORPHISMS ⋮ An improved version of the AAG cryptographic protocol ⋮ Evolution of group-theoretic cryptology attacks using hyper-heuristics ⋮ An improvement of the Diffie-Hellman noncommutative protocol ⋮ Two general schemes of algebraic cryptography
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Collection from the left and other strategies
- Probabilistic solutions of equations in the braid group.
- Group-based cryptography
- The Diffie-Hellman key exchange protocol and non-Abelian nilpotent groups
- The algorithmic theory of polycyclic-by-finite groups
- The Magma algebra system. I: The user language
- An algebraic method for public-key cryptography
- Cryptanalysis via algebraic spans
- Length-based attacks in polycyclic groups
- Two general schemes of algebraic cryptography
- A linear decomposition attack
- Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography
- Faithful representations of p-groups at characteristic p. I
- Public Key Exchange Using Semidirect Product of (Semi)Groups
- Equations over groups
- Non-commutative digital signatures
- A family of polycyclic groups over which the uniform conjugacy problem is NP-complete
- Using Semidirect Product of (Semi)groups in Public Key Cryptography
- Random subgroups and analysis of the length-based and quotient attacks
- On the orbit-stabilizer problem for integral matrix actions of polycyclic groups
- A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols
- Decision and Search in Non-Abelian Cramer-Shoup Public Key Cryptosystem
- Advances in Cryptology - CRYPTO 2003
- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol
- Public Key Cryptography - PKC 2006
This page was built for publication: A nonlinear decomposition attack