This doctoral thesis is dedicated to improve a linear algebra attack on the so-called braid group-based Diffie-Hellman conjugacy problem (BDHCP). The general procedure of the attack is to transform a BDHCP to the problem of solving several simultaneous matrix equations. A first improvement is achieved by reducing the solution space of the matrix equations to matrices that have a specific structure, which we call here the left braid structure. Using the left braid structure the number of matrix equations to be solved reduces to one. Based on the left braid structure we are further able to formulate a structure-based attack on the BDHCP. That is to transform the matrix equation to a system of linear equations and exploiting the structure of t...
We demonstrate that recent advances in the theory of braid groups, in particular a new invariant of ...
Solving the elliptic curve discrete logarithm problem (ECDLP) by using Gr¨obner basis has recently a...
In this note, we describe a probabilistic attack on public key cryptosystems based on the word/conju...
Abstract. We propose the ¯rst polynomial time algorithm for the braid Di±e-Hellman conjugacy problem...
International audienceTen years ago, Ko et al. described a Diffie-Hellman like protocol based on dec...
Abstract. Braid cryptosystem was proposed in CRYPTO 2000 as an alternate public-key cryptosystem. Th...
Wir untersuchen Darstellungsattacken auf das Zopf-Diffie-Hellman Schlüsselaustauschprotokoll via Law...
Title: Diffie and Hellman are exchanging matrices over group rings Author: Romana Linkeová Departmen...
Abstract. Lal and Chaturvedi proposed two authentication schemes based on the difficulty of the Root...
This thesis presents the side channel attack on implementation of RSA scheme where Montgomery multip...
There are recent cryptographic protocols that are based on Multiple Simultaneous Conjugacy Problems...
AbstractRecently, the generalized conjugacy problem(GCP) in braid groups was introduced as a candida...
This dissertation contains algorithms for solving linear and polynomial systems of equations overGF(...
AbstractSince the braid group was discovered by Artin (1947), the question of its conjugacy problem ...
To strengthen the resistance of countermeasures based on secret sharing,several works have suggested...
We demonstrate that recent advances in the theory of braid groups, in particular a new invariant of ...
Solving the elliptic curve discrete logarithm problem (ECDLP) by using Gr¨obner basis has recently a...
In this note, we describe a probabilistic attack on public key cryptosystems based on the word/conju...
Abstract. We propose the ¯rst polynomial time algorithm for the braid Di±e-Hellman conjugacy problem...
International audienceTen years ago, Ko et al. described a Diffie-Hellman like protocol based on dec...
Abstract. Braid cryptosystem was proposed in CRYPTO 2000 as an alternate public-key cryptosystem. Th...
Wir untersuchen Darstellungsattacken auf das Zopf-Diffie-Hellman Schlüsselaustauschprotokoll via Law...
Title: Diffie and Hellman are exchanging matrices over group rings Author: Romana Linkeová Departmen...
Abstract. Lal and Chaturvedi proposed two authentication schemes based on the difficulty of the Root...
This thesis presents the side channel attack on implementation of RSA scheme where Montgomery multip...
There are recent cryptographic protocols that are based on Multiple Simultaneous Conjugacy Problems...
AbstractRecently, the generalized conjugacy problem(GCP) in braid groups was introduced as a candida...
This dissertation contains algorithms for solving linear and polynomial systems of equations overGF(...
AbstractSince the braid group was discovered by Artin (1947), the question of its conjugacy problem ...
To strengthen the resistance of countermeasures based on secret sharing,several works have suggested...
We demonstrate that recent advances in the theory of braid groups, in particular a new invariant of ...
Solving the elliptic curve discrete logarithm problem (ECDLP) by using Gr¨obner basis has recently a...
In this note, we describe a probabilistic attack on public key cryptosystems based on the word/conju...