A fast method for comparing braids

From MaRDI portal
Publication:675872

DOI10.1006/aima.1997.1605zbMath0882.20021OpenAlexW2091159398MaRDI QIDQ675872

Patrick Dehornoy

Publication date: 6 May 1997

Published in: Advances in Mathematics (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/7545d55c9fc2dfe55320009db7585f494cf82e30




Related Items (38)

REPRESENTING BRAIDS BY AUTOMORPHISMSA class of hash functions based on the Algebraic Eraser\(^{\text{TM}}\)A FAMILY OF BRUNNIAN LINKS BASED ON EDWARDS' CONSTRUCTION OF VENN DIAGRAMSA conjecture about Artin-Tits groups.Representations of small braid groups in Temperley-Lieb algebraWeak faithfulness properties for the Burau representationSome computational aspects in the work of Patrick DehornoyBehind maths: Federating research(ers)Generic-case complexity, decision problems in group theory, and random walks.A simple algorithm for finding short sigma-definite representatives.Affine braid groups: a better platform than braid groups for cryptology?Complete positive group presentations.Every braid admits a short sigma-definite expression.Braid lift representations of Artin's Braid GroupA new distinguished form for 3-braidsTHE SUBWORD REVERSING METHODA simple algorithm to compute link polynomials defined by using skein relations\(C^1\) actions on the mapping class groups on the circleMapping class groups of covers with boundary and braid group embeddingsA new proof of the faithfulness of the Temperley–Lieb representation of B3A product on double cosets of \(B_\infty\)Entity authentication schemes using braid word reductionA weak key test for braid based cryptography.Description chirurgicale des revêtements triples simples de \(S^3\) ramifiés le long d'un entrelacs. (Surgery description of simple three fold coverings of the 3-sphere branched along a link)A Practical Attack on a Certain Braid Group Based Shifted Conjugacy Authentication ProtocolMean-set attack: cryptanalysis of Sibert et al. authentication protocolAttack on Kayawood protocol: uncloaking private keysThe braid shelfCryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux Key Agreement ProtocolEfficient solutions to the braid isotopy problem.A new approach to the word and conjugacy problems in the braid groupsNoncommutative independence from the braid group \({\mathbb{B}_{\infty}}\)Some aspects of the SD-worldAn attack on the Walnut digital signature algorithmON WORD REVERSING IN BRAID GROUPSThe fine structure of LD-equivalenceA new algorithm for solving the word problem in braid groupsIdentifying half-twists using randomized algorithm methods.



Cites Work


This page was built for publication: A fast method for comparing braids