Random subgroups and analysis of the length-based and quotient attacks
DOI10.1515/JMC.2008.003zbMATH Open1195.94067arXiv0707.1501OpenAlexW2963909615MaRDI QIDQ3516765FDOQ3516765
Authors: Alexander Ushakov, Alexei Myasnikov
Publication date: 11 August 2008
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/0707.1501
Recommendations
length-based attackbraid group cryptographycommutator key-exchangequotient attackrandom subgroup of a braid group
Symbolic computation and algebraic computation (68W30) Cryptography (94A60) Braid groups; Artin groups (20F36) Asymptotic properties of groups (20F69) Probabilistic methods in group theory (20P05)
Cited In (17)
- Length-based attacks in polycyclic groups
- Two general schemes of algebraic cryptography
- Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography
- The conjugacy problem in the Grigorchuk group is polynomial time decidable.
- Random subgroups of acylindrically hyperbolic groups and hyperbolic embeddings
- SOLENOIDAL MAPS, AUTOMATIC SEQUENCES, VAN DER PUT SERIES, AND MEALY AUTOMATA
- Length-based cryptanalysis: the case of Thompson's group
- Homomorphism reconfiguration via homotopy
- Linear time algorithm for the conjugacy problem in the first Grigorchuk group
- Exponentially generic subsets of groups
- A parallel evolutionary approach to solving systems of equations in polycyclic groups
- A nonlinear decomposition attack
- Authenticated commutator key agreement protocol
- The status of polycyclic group-based cryptography: a survey and open problems
- Evolution of group-theoretic cryptology attacks using hyper-heuristics
- Random generation of Thompson group \(F\)
- On asymptotic densities and generic properties in finitely generated groups.
This page was built for publication: Random subgroups and analysis of the length-based and quotient attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3516765)