CBraid
From MaRDI portal
Software:18080
swMATH5941MaRDI QIDQ18080FDOQ18080
Author name not available (Why is that?)
Cited In (28)
- A Practical Attack on Some Braid Group Based Cryptographic Primitives
- Groups With Two Generators Having Unsolvable Word Problem and Presentations of Mihailova Subgroups of Braid Groups
- Entity authentication schemes using braid word reduction
- Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Conjugacy search in braid groups. From a braid-based cryptogrphy point of view
- New public key cryptosystems from combinatorial group theory
- Braid Group Cryptography
- Using Decision Problems in Public Key Cryptography
- Transitive Signatures from Braid Groups
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- Non-associative public-key cryptography
- Representation attacks on the Braid Diffie-Hellman public key encryption
- The conjugacy search problem in public key cryptography: unnecessary and insufficient
- Title not available (Why is that?)
- Cryptanalysis of a key exchange protocol based on the endomorphisms ring \(\mathrm{End}(\mathbb Z_p\times\mathbb Z_{p^2})\)
- Garside theory and subsurfaces: some examples in braid groups
- An improvement of the Diffie-Hellman noncommutative protocol
- A weak key test for braid based cryptography.
- Towards generating secure keys for braid cryptography
- Title not available (Why is that?)
- Thompson’s Group and Public Key Cryptography
- Title not available (Why is that?)
This page was built for software: CBraid