scientific article
From MaRDI portal
Publication:3545319
zbMath1149.94315arXivmath/0209267MaRDI QIDQ3545319
Uzi Vishne, Shmuel Kaplan, Mina Teicher, David Garber, Boaz Tsaban
Publication date: 10 December 2008
Full work available at URL: https://arxiv.org/abs/math/0209267
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
A parallel evolutionary approach to solving systems of equations in polycyclic groups, Authenticated commutator key agreement protocol, The status of polycyclic group-based cryptography: a survey and open problems, A nonlinear decomposition attack, Affine braid groups: a better platform than braid groups for cryptology?, Combinatorial group theory and public key cryptography, Representation attacks on the Braid Diffie-Hellman public key encryption, Conjugacy search in braid groups. From a braid-based cryptogrphy point of view, The conjugacy search problem in public key cryptography: unnecessary and insufficient, Random equations in nilpotent groups., A weak key test for braid based cryptography., Exponentially generic subsets of groups, Ironwood meta key agreement and authentication protocol, Attack on Kayawood protocol: uncloaking private keys, Towards generating secure keys for braid cryptography, Evolution of group-theoretic cryptology attacks using hyper-heuristics, Probabilistic solutions of equations in the braid group.
Uses Software