Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:2724419

zbMath0991.94034MaRDI QIDQ2724419

Benji Fisher, Dorian Goldfeld, Michael Anshel, Iris Lee Anshel

Publication date: 12 July 2001


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (26)

Public key authentication scheme over quaternionsA unique key sharing protocol among three users using non-commutative group for electronic health record systemNew public key cryptosystems from combinatorial group theoryA parallel evolutionary approach to solving systems of equations in polycyclic groupsPublic key protocols over the ring \(E_{p}^{(m)}\)Algebraic generalization of Diffie-Hellman key exchangeA construction of encryption protocols over some semidirect productsOn an algorithm to decide whether a free group is a free factor of anotherNon-Abelian key agreement protocolsAffine braid groups: a better platform than braid groups for cryptology?A linear time matrix key agreement protocol over small finite fieldsConjugacy search in braid groups. From a braid-based cryptogrphy point of viewOn the conjugacy search problem and left conjugacy closed loopsThe Diffie-Hellman key exchange protocol and non-Abelian nilpotent groupsKey exchange protocols over noncommutative rings. The case ofGroups With Two Generators Having Unsolvable Word Problem and Presentations of Mihailova Subgroups of Braid GroupsEntity authentication schemes using braid word reductionA weak key test for braid based cryptography.Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebraPolynomial-time solutions of computational problems in noncommutative-algebraic cryptographyTransitive Signatures from Braid GroupsAlgebraic cryptography: new constructions and their security against provable breakEvolution of group-theoretic cryptology attacks using hyper-heuristicsSignature scheme using the root extraction problem on quaternionsCryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable FamilyNew approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups




This page was built for publication: