Using shifted conjugacy in braid-based cryptography
From MaRDI portal
Publication:3545318
Recommendations
- A practical attack on a certain braid group based shifted conjugacy authentication protocol
- Conjugacy search in braid groups. From a braid-based cryptogrphy point of view
- Cryptanalysis of the shifted conjugacy authentication protocol
- scientific article; zbMATH DE number 2144676
- A Practical Attack on Some Braid Group Based Cryptographic Primitives
Cited in
(6)- Groups with two generators having unsolvable word problem and presentations of Mihailova subgroups of braid groups
- Non-associative public-key cryptography
- New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups
- Non-associative key establishment protocols and their implementation
- The braid shelf
- A practical attack on a certain braid group based shifted conjugacy authentication protocol
This page was built for publication: Using shifted conjugacy in braid-based cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3545318)