Key exchange schemes using finite non-abelian groups
From MaRDI portal
Publication:4926909
Recommendations
Cited in
(13)- scientific article; zbMATH DE number 2076552 (Why is no real title available?)
- Non-Abelian key agreement protocols
- On the security of Stickel's key exchange scheme
- A new key exchange protocol using two layers of security
- Cryptographic multilinear maps using pro-\(p\) groups
- A non-abelian group based on block upper triangular matrices with cryptographic applications
- Group-based key exchange protocol based on complete decomposition search problem
- Oblivious transfer using non-abelian groups
- The Diffie-Hellman key exchange protocol and non-Abelian nilpotent groups
- Comparing finite abelian groups from the standpoint of their cryptographic applications
- Multilinear cryptography using nilpotent groups
- Key agreement schemes based on linear groupoids
- Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems
This page was built for publication: Key exchange schemes using finite non-abelian groups
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4926909)