Group-based cryptography
DOI10.1007/978-3-7643-8827-0zbMATH Open1248.94004OpenAlexW4212805042MaRDI QIDQ925085FDOQ925085
Authors: Vladimir Shpilrain, Alexander Ushakov, Alexei Myasnikov
Publication date: 29 May 2008
Published in: Advanced Courses in Mathematics -- CRM Barcelona (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-7643-8827-0
Recommendations
Analysis of algorithms and problem complexity (68Q25) Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01) Authentication, digital signatures and secret sharing (94A62) Special aspects of infinite or finite groups (20Fxx) Structure and classification of infinite or finite groups (20Exx)
Cited In (64)
- Vulnerability of cryptographic primitives based on the power conjugacy search problem in quantum computing
- On the algebraic structure of \(E_p^{(m)}\) and applications to cryptography
- Two general schemes of algebraic cryptography
- Computational Number Theory and Cryptography
- An extension of the noncommutative Bergman's ring with a large number of noninvertible elements
- Compressed decision problems for graph products and applications to (outer) automorphism groups.
- One-relator quotients of right-angled Artin groups
- Improved asymmetric cipher based on matrix power function with provable security
- A family of polycyclic groups over which the uniform conjugacy problem is NP-complete.
- Geometry and Combinatorics via Right-Angled Artin Groups
- Group theory in cryptography
- Using Semidirect Product of (Semi)groups in Public Key Cryptography
- Affine braid groups: a better platform than braid groups for cryptology?
- A deterministic worst-case message complexity optimal solution for resource discovery
- Title not available (Why is that?)
- Interactively secure groups from obfuscation
- Asymptotic invariants, complexity of groups and related problems.
- Ironwood meta key agreement and authentication protocol
- Exponentially generic subsets of groups
- Group encryption: full dynamicity, message filtering and code-based instantiation
- Conjugacy in Baumslag's group, generic case complexity, and division in power circuits
- Generalized learning problems and applications to non-commutative cryptography. (Extended abstract)
- Title not available (Why is that?)
- CRYPTANALYSIS OF USHAKOV — SHPILRAIN’S AUTHENTICATION PROTOCOL BASED ON THE TWISTED CONJUGACY PROBLEM
- Følner functions and the generic word problem for finitely generated amenable groups
- Group operations and isomorphic relation with the 2-tuple linguistic variables
- Towards an operad-based cryptography: applications of commutative operads
- Title not available (Why is that?)
- Graph coloring applied to secure computation in non-abelian groups
- Algebraic cryptography: new constructions and their security against provable break
- Group theoretic cryptography
- A nonlinear decomposition attack
- Authenticated commutator key agreement protocol
- Public key protocols over the ring \(E_{p}^{(m)}\)
- Authentication schemes from actions on graphs, groups, or rings
- On the arithmetic of the endomorphisms ring \(\text{End}(\mathbb Z_p\times\mathbb Z_{p^2})\).
- Positive elements and sufficient conditions for solvability of the submonoid membership problem for nilpotent groups of class two
- Compressed word problems in HNN-extensions and amalgamated products
- Evolution of group-theoretic cryptology attacks using hyper-heuristics
- Cryptosystems using linear groups
- Reidemeister classes and twisted inner representations.
- Key agreement based on automaton groups
- Partial word and equality problems and Banach densities
- Title not available (Why is that?)
- Cryptanalysis of the CLR-cryptosystem
- Compressed Word Problems in HNN-Extensions and Amalgamated Products
- Is the Data Encryption Standard a Group? (Preliminary Abstract)
- Group ID-based encryption with equality test
- Linear decomposition method in analyzing hidden information protocols on algebraic platforms
- An improved version of the AAG cryptographic protocol
- Title not available (Why is that?)
- On groups that have normal forms computable in logspace.
- A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery
- Key exchange protocols over noncommutative rings. The case of End(\(\mathbb Z_p \times \mathbb Z_{p^{2}}\))
- Title not available (Why is that?)
- GENERAL ALGEBRAIC CRYPTOGRAPHIC KEY EXCHANGE SCHEME AND ITS CRYPTANALYSIS
- Monoidal categories, representation gap and cryptography
- Improved parallel algorithms for generalized Baumslag groups
- On Eulerian semigroups of multivariate transformations and their cryptographic applications
- On new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groups
- Undecidability of the submonoid membership problem for free nilpotent group of class $l\geqslant 2$ of sufficiently large rank
- AUTHENTICATED TRIPARTITE KEY AGREEMENT PROTOCOL USING DIGITAL SIGNATURE ALGORITHM
- Oblivious transfer using non-abelian groups
- Complete decomposition of dihedral groups with application to key exchange protocol
This page was built for publication: Group-based cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q925085)