© 2016, Pleiades Publishing, Ltd.In this paper we discuss the possibility of using the categorical groupoids and the commutative operads in algebraic cryptography. Also, we introduce a general method of constructing the cryptographic protocols on the algebraic platforms. Under certain reasonable assumptions, this method allows to get a new sufficiently cryptographically strong protocol using several other protocols. Moreover, each of these protocols can be vulnerable. Sufficient cryptographic security means that the protocol will be protected for some preassigned finite time
Algebraic attacks have recently acquired great importance in the area of cryptography, not only due ...
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptogra...
Many security protocols fundamentally depend on the algebraic properties of cryptographic operators....
© 2016, Pleiades Publishing, Ltd.In this paper we discuss the possibility of using the categorical g...
© 2016, Pleiades Publishing, Ltd.In this paper we show the use of commutative operads in public-key ...
International audienceCryptographic protocols are successfully analyzed using formal methods. Howeve...
Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches u...
We present variants of the signature schemes of GuillouQuisquater ElGamal and Schnorr whose securi...
International audienceThe algebraic-group model (AGM), which lies between the generic group model an...
he algebraic-group model (AGM), which lies between the generic group model and the standard model of...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
Cryptographic protocols are small concurrent programs designed to guarantee the security of exchange...
The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primit...
In this work, my advisor Delaram Kahrobaei, our collaborator David Garber, and I explore polycyclic ...
I present research on various encryption schemes and their applications in securing data. To do this...
Algebraic attacks have recently acquired great importance in the area of cryptography, not only due ...
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptogra...
Many security protocols fundamentally depend on the algebraic properties of cryptographic operators....
© 2016, Pleiades Publishing, Ltd.In this paper we discuss the possibility of using the categorical g...
© 2016, Pleiades Publishing, Ltd.In this paper we show the use of commutative operads in public-key ...
International audienceCryptographic protocols are successfully analyzed using formal methods. Howeve...
Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches u...
We present variants of the signature schemes of GuillouQuisquater ElGamal and Schnorr whose securi...
International audienceThe algebraic-group model (AGM), which lies between the generic group model an...
he algebraic-group model (AGM), which lies between the generic group model and the standard model of...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
Cryptographic protocols are small concurrent programs designed to guarantee the security of exchange...
The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primit...
In this work, my advisor Delaram Kahrobaei, our collaborator David Garber, and I explore polycyclic ...
I present research on various encryption schemes and their applications in securing data. To do this...
Algebraic attacks have recently acquired great importance in the area of cryptography, not only due ...
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptogra...
Many security protocols fundamentally depend on the algebraic properties of cryptographic operators....