A Practical Attack on a Braid Group Based Cryptographic Protocol
From MaRDI portal
Publication:5451020
Recommendations
- A Practical Attack on Some Braid Group Based Cryptographic Primitives
- A weak key test for braid based cryptography.
- Braid Group Cryptography
- A practical attack on a certain braid group based shifted conjugacy authentication protocol
- Conjugacy search in braid groups. From a braid-based cryptogrphy point of view
Cited in
(20)- scientific article; zbMATH DE number 5380260 (Why is no real title available?)
- Algebraic cryptanalysis and new security enhancements
- Length-based attacks in polycyclic groups
- Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography
- Signature scheme using the root extraction problem on quaternions
- Monoidal categories, representation gap and cryptography
- Mean-set attack: cryptanalysis of Sibert et al. authentication protocol
- Braid Group Cryptography
- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol
- A novel version of the hidden logarithm problem for post-quantum signature algorithms
- Attack on Kayawood protocol: uncloaking private keys
- New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups
- Transitive Signatures from Braid Groups
- An attack on the Walnut digital signature algorithm
- Authenticated commutator key agreement protocol
- Discrete logarithms for finite groups
- Representation attacks on the Braid Diffie-Hellman public key encryption
- Towards generating secure keys for braid cryptography
- A practical attack on a certain braid group based shifted conjugacy authentication protocol
- scientific article; zbMATH DE number 2086695 (Why is no real title available?)
This page was built for publication: A Practical Attack on a Braid Group Based Cryptographic Protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451020)