Thompson’s Group and Public Key Cryptography
From MaRDI portal
Publication:3593139
DOI10.1007/11496137_11zbMath1126.68416arXivmath/0505487OpenAlexW1545445951MaRDI QIDQ3593139
Vladimir Shpilrain, Alexander Ushakov
Publication date: 24 September 2007
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/math/0505487
Generators, relations, and presentations of groups (20F05) Geometric group theory (20F65) Cryptography (94A60)
Related Items (24)
Thompson's group \(F\) is 1-counter graph automatic. ⋮ A PTIME solution to the restricted conjugacy problem in generalized Heisenberg groups ⋮ Authenticated commutator key agreement protocol ⋮ Quantum algorithms for typical hard problems: a perspective of cryptanalysis ⋮ A construction of encryption protocols over some semidirect products ⋮ Full quantum equivalence of group action DLog and CDH, and more ⋮ Rewriting system of certain semigroups with three generators ⋮ The Generation Problem in Thompson Group 𝐹 ⋮ Oblivious transfer using non-abelian groups ⋮ Affine braid groups: a better platform than braid groups for cryptology? ⋮ On subgroups of R. Thompson’s group $F$ ⋮ Generic complexity of finitely presented monoids and semigroups ⋮ Coherence and strictification for self-similarity ⋮ Cryptanalysis of a key exchange protocol based on the ring \(E_p^{(m)}\) ⋮ Length-based cryptanalysis: the case of Thompson's group ⋮ Properties of certain semigroups and their potential as platforms for cryptosystems ⋮ Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography ⋮ Why you cannot even hope to use Ore algebras in cryptography ⋮ Determining solubility for finitely generated groups of PL homeomorphisms ⋮ Cryptanalysis of the Shpilrain-Ushakov protocol for Thompson's group ⋮ Knapsack problems in groups ⋮ Why you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failures ⋮ Unnamed Item ⋮ Conjugacy systems based on nonabelian factorization problems and their applications in cryptography
Uses Software
This page was built for publication: Thompson’s Group and Public Key Cryptography