Towards generating secure keys for braid cryptography
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 5380256 (Why is no real title available?)
- scientific article; zbMATH DE number 1950342 (Why is no real title available?)
- scientific article; zbMATH DE number 2009975 (Why is no real title available?)
- scientific article; zbMATH DE number 2081063 (Why is no real title available?)
- scientific article; zbMATH DE number 1759777 (Why is no real title available?)
- scientific article; zbMATH DE number 2144676 (Why is no real title available?)
- scientific article; zbMATH DE number 2086696 (Why is no real title available?)
- A Practical Attack on Some Braid Group Based Cryptographic Primitives
- A Practical Attack on a Braid Group Based Cryptographic Protocol
- A new approach to the conjugacy problem in Garside groups.
- A weak key test for braid based cryptography.
- ALGORITHMS FOR POSITIVE BRAIDS
- Advances in Cryptology - CRYPTO 2003
- An algebraic method for public-key cryptography
- Conjugacy in Garside groups. I: Cyclings, powers and rigidity.
- Conjugacy problem for braid groups and Garside groups.
- Conjugacy search in braid groups. From a braid-based cryptogrphy point of view
- Entity authentication schemes using braid word reduction
- THE BRAID GROUP AND OTHER GROUPS
- The infimum, supremum, and geodesic length of a braid conjugacy class.
Cited in
(22)- On the algebraic structure of \(E_p^{(m)}\) and applications to cryptography
- A Practical Attack on Some Braid Group Based Cryptographic Primitives
- Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography
- Cryptanalysis of the shifted conjugacy authentication protocol
- ALGEBRAIC BRAID GROUP PUBLIC KEY CRYPTOGRAPHY
- scientific article; zbMATH DE number 1950342 (Why is no real title available?)
- scientific article; zbMATH DE number 1759777 (Why is no real title available?)
- Conjugacy search in braid groups. From a braid-based cryptogrphy point of view
- scientific article; zbMATH DE number 2144687 (Why is no real title available?)
- Public Key Cryptography - PKC 2006
- Groups with two generators having unsolvable word problem and presentations of Mihailova subgroups of braid groups
- The root extraction problem in braid group-based cryptography
- New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups
- Transitive Signatures from Braid Groups
- scientific article; zbMATH DE number 2009975 (Why is no real title available?)
- scientific article; zbMATH DE number 2144676 (Why is no real title available?)
- Public key protocols over the ring \(E_{p}^{(m)}\)
- Representation attacks on the Braid Diffie-Hellman public key encryption
- scientific article; zbMATH DE number 1842508 (Why is no real title available?)
- A weak key test for braid based cryptography.
- A public key encryption algorithm on braid groups
- Key exchange protocols over noncommutative rings. The case of End(\(\mathbb Z_p \times \mathbb Z_{p^{2}}\))
This page was built for publication: Towards generating secure keys for braid cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1008952)