Using shifted conjugacy in braid-based cryptography
From MaRDI portal
Publication:3545318
zbMATH Open1191.94085arXivcs/0609091MaRDI QIDQ3545318FDOQ3545318
Authors: Patrick Dehornoy
Publication date: 10 December 2008
Full work available at URL: https://arxiv.org/abs/cs/0609091
Recommendations
- A practical attack on a certain braid group based shifted conjugacy authentication protocol
- Conjugacy search in braid groups. From a braid-based cryptogrphy point of view
- Cryptanalysis of the shifted conjugacy authentication protocol
- scientific article; zbMATH DE number 2144676
- A Practical Attack on Some Braid Group Based Cryptographic Primitives
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Braid groups; Artin groups (20F36) Authentication, digital signatures and secret sharing (94A62)
Cited In (6)
- Groups With Two Generators Having Unsolvable Word Problem and Presentations of Mihailova Subgroups of Braid Groups
- New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups
- Non-associative public-key cryptography
- The braid shelf
- A practical attack on a certain braid group based shifted conjugacy authentication protocol
- Non-associative key establishment protocols and their implementation
Uses Software
This page was built for publication: Using shifted conjugacy in braid-based cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3545318)