© 2016, Pleiades Publishing, Ltd.In this paper we show the use of commutative operads in public-key cryptography. Commutative operads were introduced by S.N. Tronin in 2006. They are a special case of algebraic operads and a natural generalization of commutative algebraic theories. We consider some cryptographic protocols based on commutative operads. For the protocol of the creation a common secret key, we describe and investigate its implementation and cryptographic security in particular cases
he algebraic-group model (AGM), which lies between the generic group model and the standard model of...
The paper presents an overview of recent developments in the design of cryptographic algorithms. A s...
Modern communication relies on cryptography to ensure the security, integrity, and authenticity of o...
© 2016, Pleiades Publishing, Ltd.In this paper we show the use of commutative operads in public-key ...
© 2016, Pleiades Publishing, Ltd.In this paper we discuss the possibility of using the categorical g...
International audienceCryptographic protocols are successfully analyzed using formal methods. Howeve...
Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches u...
Many formal techniques for the verification of cryptographic protocols rely on the abstract definiti...
Colloque avec actes et comité de lecture. internationale.International audienceWe show that deciding...
AbstractMany cryptographic protocols and attacks on these protocols make use of the fact that the or...
We generalize the construction of multitildes in the aim to provide multitilde operators for regular...
International audienceOperads are algebraic devices offering a formalization of the concept of opera...
About 20 years ago, Wagner showed that most of the (then) known techniques used in the cryptanalysis...
We present the noncommutative version of the Polly Cracker cryptosystem, which is more promising tha...
International audienceThe algebraic-group model (AGM), which lies between the generic group model an...
he algebraic-group model (AGM), which lies between the generic group model and the standard model of...
The paper presents an overview of recent developments in the design of cryptographic algorithms. A s...
Modern communication relies on cryptography to ensure the security, integrity, and authenticity of o...
© 2016, Pleiades Publishing, Ltd.In this paper we show the use of commutative operads in public-key ...
© 2016, Pleiades Publishing, Ltd.In this paper we discuss the possibility of using the categorical g...
International audienceCryptographic protocols are successfully analyzed using formal methods. Howeve...
Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches u...
Many formal techniques for the verification of cryptographic protocols rely on the abstract definiti...
Colloque avec actes et comité de lecture. internationale.International audienceWe show that deciding...
AbstractMany cryptographic protocols and attacks on these protocols make use of the fact that the or...
We generalize the construction of multitildes in the aim to provide multitilde operators for regular...
International audienceOperads are algebraic devices offering a formalization of the concept of opera...
About 20 years ago, Wagner showed that most of the (then) known techniques used in the cryptanalysis...
We present the noncommutative version of the Polly Cracker cryptosystem, which is more promising tha...
International audienceThe algebraic-group model (AGM), which lies between the generic group model an...
he algebraic-group model (AGM), which lies between the generic group model and the standard model of...
The paper presents an overview of recent developments in the design of cryptographic algorithms. A s...
Modern communication relies on cryptography to ensure the security, integrity, and authenticity of o...