CBraid
From MaRDI portal
Software:18080
swMATH5941MaRDI QIDQ18080FDOQ18080
Author name not available (Why is that?)
Cited In (28)
- A Practical Attack on Some Braid Group Based Cryptographic Primitives
- Using shifted conjugacy in braid-based cryptography
- Entity authentication schemes using braid word reduction
- Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Inverting the Burau and Lawrence-Krammer representations
- Conjugacy search in braid groups. From a braid-based cryptogrphy point of view
- New public key cryptosystems from combinatorial group theory
- Braid Group Cryptography
- The enumeration and classification of knots and links
- Groups with two generators having unsolvable word problem and presentations of Mihailova subgroups of braid groups
- Non-associative public-key cryptography
- Using Decision Problems in Public Key Cryptography
- Transitive Signatures from Braid Groups
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- Representation attacks on the Braid Diffie-Hellman public key encryption
- The conjugacy search problem in public key cryptography: unnecessary and insufficient
- Cryptanalysis of a key exchange protocol based on the endomorphisms ring \(\mathrm{End}(\mathbb Z_p\times\mathbb Z_{p^2})\)
- Garside theory and subsurfaces: some examples in braid groups
- An improvement of the Diffie-Hellman noncommutative protocol
- A weak key test for braid based cryptography.
- Towards generating secure keys for braid cryptography
- A new key exchange protocol based on the decomposition problem
- Using the subgroup membership search problem in public key cryptography
- Thompson’s Group and Public Key Cryptography
This page was built for software: CBraid