Key exchange schemes using finite non-abelian groups
From MaRDI portal
Publication:4926909
zbMATH Open1274.94084MaRDI QIDQ4926909FDOQ4926909
Authors: Chunfei Ju, Jingwei Yan, Baocang Wang
Publication date: 20 June 2013
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Symmetric groups (20B30) Representation theory for linear algebraic groups (20G05)
Cited In (13)
- Title not available (Why is that?)
- Non-Abelian key agreement protocols
- On the security of Stickel's key exchange scheme
- A new key exchange protocol using two layers of security
- Cryptographic multilinear maps using pro-\(p\) groups
- A non-abelian group based on block upper triangular matrices with cryptographic applications
- Group-based key exchange protocol based on complete decomposition search problem
- Oblivious transfer using non-abelian groups
- The Diffie-Hellman key exchange protocol and non-Abelian nilpotent groups
- Comparing finite abelian groups from the standpoint of their cryptographic applications
- Multilinear cryptography using nilpotent groups
- Key agreement schemes based on linear groupoids
- Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems
This page was built for publication: Key exchange schemes using finite non-abelian groups
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4926909)