Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3101433

zbMath1248.94006MaRDI QIDQ3101433

Vladimir Shpilrain, Alexander Ushakov, Alexei G. Myasnikov

Publication date: 29 November 2011


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (44)

Randomness and complexity in matrix groupsSome new platforms for algebraic cryptography and one method of increasing the securityAlgorithmic problems in right-angled Artin groups: complexity and applicationsAnalysis of secret sharing schemes based on Nielsen transformationsUsing Semidirect Product of (Semi)groups in Public Key CryptographyAuthenticated commutator key agreement protocolThe status of polycyclic group-based cryptography: a survey and open problemsA nonlinear decomposition attackEnhanced matrix power function for cryptographic primitive constructionPositive elements and sufficient conditions for solvability of the submonoid membership problem for nilpotent groups of class twoReidemeister classes and twisted inner representations.On Eulerian semigroups of multivariate transformations and their cryptographic applicationsUndecidability of the submonoid membership problem for free nilpotent group of class $l\geqslant 2$ of sufficiently large rankKnapsack problems in products of groupsMonoidal categories, representation gap and cryptographyOn new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groupsAsymptotic Density and the Theory of Computability: A Partial SurveyNon-associative key establishment protocols and their implementationCRYPTANALYSIS OF USHAKOV — SHPILRAIN’S AUTHENTICATION PROTOCOL BASED ON THE TWISTED CONJUGACY PROBLEMGENERAL ALGEBRAIC CRYPTOGRAPHIC KEY EXCHANGE SCHEME AND ITS CRYPTANALYSISLinear decomposition method in analyzing hidden information protocols on algebraic platformsUndeniable signature scheme based over group ringCryptanalysis of a key exchange protocol based on the endomorphisms ring \(\mathrm{End}(\mathbb Z_p\times\mathbb Z_{p^2})\)Algorithmic problems in Engel groups and cryptographic applicationsA key exchange protocol using matrices over group ringAnalysis of a key exchange protocol based on tropical matrix algebraSymmetric and asymmetric cryptographic key exchange protocols in the octonion algebraAttack on Kayawood protocol: uncloaking private keysPolynomial-time solutions of computational problems in noncommutative-algebraic cryptographyGeneric case completenessLinear groups and computationSolving the Conjugacy Decision Problem via Machine LearningAn improved version of the AAG cryptographic protocolConjugacy search problem and the Andrews-Curtis conjectureLWE from non-commutative group ringsTwo general schemes of algebraic cryptographyAn attack on the Walnut digital signature algorithmKnapsack problems in groupsUnnamed ItemUnnamed ItemUnnamed ItemConjugacy systems based on nonabelian factorization problems and their applications in cryptographyCryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable FamilySOLENOIDAL MAPS, AUTOMATIC SEQUENCES, VAN DER PUT SERIES, AND MEALY AUTOMATA




This page was built for publication: