A Practical Attack on a Braid Group Based Cryptographic Protocol
From MaRDI portal
Publication:5451020
DOI10.1007/11535218_6zbMATH Open1145.94448OpenAlexW1563048562MaRDI QIDQ5451020FDOQ5451020
Authors: Vladimir Shpilrain, Alexander Ushakov, Alexei Myasnikov
Publication date: 17 March 2008
Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11535218_6
Recommendations
- A Practical Attack on Some Braid Group Based Cryptographic Primitives
- A weak key test for braid based cryptography.
- Braid Group Cryptography
- A practical attack on a certain braid group based shifted conjugacy authentication protocol
- Conjugacy search in braid groups. From a braid-based cryptogrphy point of view
Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Braid groups; Artin groups (20F36)
Cited In (20)
- Length-based attacks in polycyclic groups
- Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography
- Monoidal categories, representation gap and cryptography
- Mean-set attack: cryptanalysis of Sibert et al. authentication protocol
- Signature scheme using the root extraction problem on quaternions
- Braid Group Cryptography
- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol
- A novel version of the hidden logarithm problem for post-quantum signature algorithms
- Attack on Kayawood protocol: uncloaking private keys
- New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups
- Transitive Signatures from Braid Groups
- An attack on the Walnut digital signature algorithm
- Authenticated commutator key agreement protocol
- Discrete logarithms for finite groups
- Representation attacks on the Braid Diffie-Hellman public key encryption
- Towards generating secure keys for braid cryptography
- A practical attack on a certain braid group based shifted conjugacy authentication protocol
- Title not available (Why is that?)
- Title not available (Why is that?)
- Algebraic cryptanalysis and new security enhancements
This page was built for publication: A Practical Attack on a Braid Group Based Cryptographic Protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451020)