Group-based cryptography

From MaRDI portal
Publication:925085

DOI10.1007/978-3-7643-8827-0zbMath1248.94004OpenAlexW4212805042MaRDI QIDQ925085

Alexander Ushakov, Vladimir Shpilrain, Alexei G. Myasnikov

Publication date: 29 May 2008

Published in: Advanced Courses in Mathematics -- CRM Barcelona (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-7643-8827-0




Related Items

AUTHENTICATED TRIPARTITE KEY AGREEMENT PROTOCOL USING DIGITAL SIGNATURE ALGORITHMGeometry and Combinatorics via Right-Angled Artin GroupsTowards an operad-based cryptography: applications of commutative operadsUsing Semidirect Product of (Semi)groups in Public Key CryptographyAuthenticated commutator key agreement protocolA nonlinear decomposition attackGroup operations and isomorphic relation with the 2-tuple linguistic variablesPublic key protocols over the ring \(E_{p}^{(m)}\)Computational Number Theory and CryptographyFølner functions and the generic word problem for finitely generated amenable groupsOn groups that have normal forms computable in logspace.Key agreement based on automaton groupsPartial word and equality problems and Banach densitiesGraph coloring applied to secure computation in non-abelian groupsCryptanalysis of the CLR-cryptosystemImproved asymmetric cipher based on matrix power function with provable securityPositive elements and sufficient conditions for solvability of the submonoid membership problem for nilpotent groups of class twoReidemeister classes and twisted inner representations.On Eulerian semigroups of multivariate transformations and their cryptographic applicationsUndecidability of the submonoid membership problem for free nilpotent group of class $l\geqslant 2$ of sufficiently large rankMonoidal categories, representation gap and cryptographyImproved parallel algorithms for generalized Baumslag groupsOn new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groupsOblivious transfer using non-abelian groupsOn the arithmetic of the endomorphisms ring \(\text{End}(\mathbb Z_p\times\mathbb Z_{p^2})\).Affine braid groups: a better platform than braid groups for cryptology?One-relator quotients of right-angled Artin groupsAuthentication schemes from actions on graphs, groups, or ringsCompressed word problems in HNN-extensions and amalgamated productsCRYPTANALYSIS OF USHAKOV — SHPILRAIN’S AUTHENTICATION PROTOCOL BASED ON THE TWISTED CONJUGACY PROBLEMGENERAL ALGEBRAIC CRYPTOGRAPHIC KEY EXCHANGE SCHEME AND ITS CRYPTANALYSISLinear decomposition method in analyzing hidden information protocols on algebraic platformsKey exchange protocols over noncommutative rings. The case ofOn the algebraic structure of \(E_p^{(m)}\) and applications to cryptographyCOMPRESSED DECISION PROBLEMS FOR GRAPH PRODUCTS AND APPLICATIONS TO (OUTER) AUTOMORPHISM GROUPSAn extension of the noncommutative Bergman's ring with a large number of noninvertible elementsVulnerability of cryptographic primitives based on the power conjugacy search problem in quantum computingExponentially generic subsets of groupsIronwood meta key agreement and authentication protocolConjugacy in Baumslag's group, generic case complexity, and division in power circuitsAlgebraic cryptography: new constructions and their security against provable breakAn improved version of the AAG cryptographic protocolGeneralized Learning Problems and Applications to Non-commutative CryptographyEvolution of group-theoretic cryptology attacks using hyper-heuristicsCompressed Word Problems in HNN-Extensions and Amalgamated ProductsTwo general schemes of algebraic cryptographyUnnamed ItemUnnamed ItemUnnamed ItemA deterministic worst-case message complexity optimal solution for resource discoveryA Deterministic Worst-Case Message Complexity Optimal Solution for Resource DiscoveryAsymptotic invariants, complexity of groups and related problemsA family of polycyclic groups over which the uniform conjugacy problem is NP-complete