Signature scheme using the root extraction problem on quaternions
From MaRDI portal
Recommendations
- A digital signature scheme based on the root extraction problem on a matrix ring
- Weakness in quaternion signatures
- New signature scheme based on difficulty of finding roots
- scientific article; zbMATH DE number 1494170
- Public key encryption and signature schemes based on polynomials over \(\mathbb{Z}_n\)
Cites work
- scientific article; zbMATH DE number 1617914 (Why is no real title available?)
- scientific article; zbMATH DE number 1950342 (Why is no real title available?)
- scientific article; zbMATH DE number 2009975 (Why is no real title available?)
- scientific article; zbMATH DE number 1494170 (Why is no real title available?)
- scientific article; zbMATH DE number 1759777 (Why is no real title available?)
- scientific article; zbMATH DE number 2086696 (Why is no real title available?)
- scientific article; zbMATH DE number 1842507 (Why is no real title available?)
- scientific article; zbMATH DE number 2114217 (Why is no real title available?)
- scientific article; zbMATH DE number 2230905 (Why is no real title available?)
- A Practical Attack on a Braid Group Based Cryptographic Protocol
- A Survey of Public-Key Cryptosystems
- A linear time matrix key agreement protocol over small finite fields
- A note on the security of \(\text{MST} _{3}\)
- A public key cryptosystem based on non-abelian finite groups
- Advances in Cryptology - CRYPTO 2003
- An algebraic method for public-key cryptography
- An efficient solution of the congruence<tex>x^2 + ky^2 = mpmod{n}</tex>
- Computer network security. 5th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2010, St. Petersburg, Russia, September 8--10, 2010. Proceedings
- Conjugate adjoining problem in braid groups and new design of braid-based signatures
- Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups
- Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux Key Agreement Protocol
- Cryptanalysis of the \(MST_{3}\) public key cryptosystem
- Cryptanalysis of Álvarez et al. key exchange scheme
- Generalized learning problems and applications to non-commutative cryptography. (Extended abstract)
- Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials
- Key exchange protocols over noncommutative rings. The case of End(\(\mathbb Z_p \times \mathbb Z_{p^{2}}\))
- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol
- New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups
- Non-Abelian key agreement protocols
- Non-commutative digital signatures
- On the Security of MOR Public Key Cryptosystem
- Security Analysis of the MOR Cryptosystem
- Weak keys in MST\(_{1}\)
- Weakness in quaternion signatures
Cited in
(5)
This page was built for publication: Signature scheme using the root extraction problem on quaternions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2336748)