Signature scheme using the root extraction problem on quaternions
From MaRDI portal
Publication:2336748
DOI10.1155/2014/819182zbMath1442.94048OpenAlexW2121745151WikidataQ59052598 ScholiaQ59052598MaRDI QIDQ2336748
Publication date: 19 November 2019
Published in: Journal of Applied Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1155/2014/819182
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A note on the security of \(\text{MST} _{3}\)
- Computer network security. 5th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2010, St. Petersburg, Russia, September 8--10, 2010. Proceedings
- A public key cryptosystem based on non-abelian finite groups
- Non-Abelian key agreement protocols
- An algebraic method for public-key cryptography
- New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups
- A linear time matrix key agreement protocol over small finite fields
- Weak keys in MST\(_{1}\)
- Cryptanalysis of Álvarez et al. key exchange scheme
- Non-commutative digital signatures
- Generalized Learning Problems and Applications to Non-commutative Cryptography
- Cryptanalysis of the MST 3 public key cryptosystem
- Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials
- Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux Key Agreement Protocol
- An efficient solution of the congruence<tex>x^2 + ky^2 = mpmod{n}</tex>
- Security Analysis of the MOR Cryptosystem
- A Survey of Public-Key Cryptosystems
- Key exchange protocols over noncommutative rings. The case of
- Conjugate adjoining problem in braid groups and new design of braid-based signatures
- Advances in Cryptology - CRYPTO 2003
- A Practical Attack on a Braid Group Based Cryptographic Protocol
- On the Security of MOR Public Key Cryptosystem
- Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups
- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol
- Weakness in quaternion signatures
This page was built for publication: Signature scheme using the root extraction problem on quaternions