scientific article; zbMATH DE number 1759777

From MaRDI portal
Publication:4536800

zbMath0995.94531MaRDI QIDQ4536800

Ki Hyoung Ko, Choonsik Park, Jung Hee Cheon, Sang Jin Lee, Jae Woo Han, Ju-Sung Kang

Publication date: 7 October 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (89)

Public key authentication scheme over quaternionsA unique key sharing protocol among three users using non-commutative group for electronic health record systemNovel Digital Signature Scheme with Multiple Private Keys on Non-commutative Division SemiringsReducing the Key Size of Rainbow Using Non-commutative RingsA PTIME solution to the restricted conjugacy problem in generalized Heisenberg groupsComputation of centralizers in braid groups and Garside groups.New public key cryptosystems from combinatorial group theoryQuantum lattice enumeration and tweaking discrete pruningGeometry and Combinatorics via Right-Angled Artin GroupsPublic key cryptography based on Moufang loopsA parallel evolutionary approach to solving systems of equations in polycyclic groupsAuthenticated commutator key agreement protocolThe status of polycyclic group-based cryptography: a survey and open problemsA nonlinear decomposition attackPublic key protocols over the ring \(E_{p}^{(m)}\)The conjugacy problem in free solvable groups and wreath products of abelian groups is in \({\mathsf {TC}^0}\)Combinatorics of normal sequences of braidsMatrix PRFs: constructions, attacks, and applications to obfuscationCryptanalysis of a combinatorial public key cryptosystemUnnamed ItemAlgebraic generalization of Diffie-Hellman key exchangeOn Eulerian semigroups of multivariate transformations and their cryptographic applicationsNormal forms of random braids.A construction of encryption protocols over some semidirect productsOn the security of DLCSP over \(\mathrm{GL}_n (\mathbb{F}_q [S_r)\)] ⋮ Full quantum equivalence of group action DLog and CDH, and moreMonoidal categories, representation gap and cryptographyConjugacy problem for braid groups and Garside groups.Some undecidability results for asynchronous transducers and the Brin-Thompson group $2V$Rewriting system of certain semigroups with three generatorsOn new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groupsOblivious transfer using non-abelian groupsNon-Abelian key agreement protocolsComplexity of the generalized conjugacy problemOn the arithmetic of the endomorphisms ring \(\text{End}(\mathbb Z_p\times\mathbb Z_{p^2})\).Affine braid groups: a better platform than braid groups for cryptology?Gröbner basis cryptosystemsCryptosystems using linear groupsHomomorphic public-key cryptosystems and encrypting Boolean circuitsCombinatorial group theory and public key cryptographyRepresentation attacks on the Braid Diffie-Hellman public key encryptionConjugacy search in braid groups. From a braid-based cryptogrphy point of viewThe conjugacy search problem in public key cryptography: unnecessary and insufficientShort expressions of permutations as products and cryptanalysis of the algebraic eraserNon-associative public-key cryptographyGeometry of the conjugacy problem in lamplighter groupsCategorical interpretations of some key agreement protocolsTowards practical key exchange from ordinary isogeny graphsTesting graph isotopy on surfacesOn the conjugacy search problem and left conjugacy closed loopsThe Diffie-Hellman key exchange protocol and non-Abelian nilpotent groupsGENERAL ALGEBRAIC CRYPTOGRAPHIC KEY EXCHANGE SCHEME AND ITS CRYPTANALYSISLinear decomposition method in analyzing hidden information protocols on algebraic platformsKey exchange protocols over noncommutative rings. The case ofOn the algebraic structure of \(E_p^{(m)}\) and applications to cryptographyCryptanalysis of a key exchange protocol based on the endomorphisms ring \(\mathrm{End}(\mathbb Z_p\times\mathbb Z_{p^2})\)Groups With Two Generators Having Unsolvable Word Problem and Presentations of Mihailova Subgroups of Braid GroupsEntity authentication schemes using braid word reductionWeak keys in MST\(_{1}\)A weak key test for braid based cryptography.Algorithmic problems in Engel groups and cryptographic applicationsIronwood meta key agreement and authentication protocolA key exchange protocol using matrices over group ringSymmetric and asymmetric cryptographic key exchange protocols in the octonion algebraAttack on Kayawood protocol: uncloaking private keysProperties of certain semigroups and their potential as platforms for cryptosystemsLaver's results and low-dimensional topologyEfficient solutions to the braid isotopy problem.К анализу некоторых систем открытого распределения ключей, основанных на неабелевых группахPolynomial-time solutions of computational problems in noncommutative-algebraic cryptographyTransitive Signatures from Braid GroupsTowards generating secure keys for braid cryptographyNormal forms in braid groups with respect to some Gröbner–Shirshov basisSome applications of arithmetic groups in cryptographyAn infinite family of braid group representations in automorphism groups of free groupsCryptanalysis of the Shpilrain-Ushakov protocol for Thompson's groupEvolution of group-theoretic cryptology attacks using hyper-heuristicsThe conjugacy problem in free solvable groups and wreath products of abelian groups is in \(\mathsf{TC}^0\)An improvement of the Diffie-Hellman noncommutative protocolTwo general schemes of algebraic cryptographyA Security Analysis of Uniformly-Layered RainbowConjugacy systems based on nonabelian factorization problems and their applications in cryptographySignature scheme using the root extraction problem on quaternionsA new approach to the conjugacy problem in Garside groups.Public-key cryptography and invariant theoryOn non-Abelian homomorphic public-key cryptosystemsCryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable FamilyNew approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groupsProbabilistic solutions of equations in the braid group.




This page was built for publication: