We propose building a new PKC in a ring structure, the classification of rings being an open problem. The difficulty of the scheme is based on retrieving the eigenvalues of endomorphism on a finite type module over a non-commutative ring. It is resistant to a chosen cipher text attack. Working in the fraction ring of a non-commutative ring makes our scheme a zero-knowledge proof of knowledge, result indistinguishable, in the Naor-Yung model. Finally, a dramatic improvement in security is obtained through the drawing with uniform probability of the working ring at high frequency
Many of the asymmetric cryptography protocols are based on operations performed on commutative algeb...
We present the noncommutative version of the Polly Cracker cryptosystem, which is more promising tha...
Algebra is one of the important fields of mathematics. It concerns with the study and manipulation o...
We propose building a new PKC in a ring structure, the classification of rings being an open problem...
In this paper we use the nonrepresentable ring E_p(m) to introduce public key cryptosystems in nonco...
In this paper we introduce some key exchange protocols over noncommutative rings. These protocols us...
The Learning with Errors (LWE) problem is the fundamental backbone of modern lattice-based cryptogra...
This work is focused on the description of one verifiable encryption scheme, specifically a zero-kno...
Multivariate Public Key Cryptosystems (MPKC) can be potentially applied to post-quantum cryptography...
Post-quantum cryptography (PQC) is a trend that has a deserved NIST status, and which aims to be res...
In this paper we introduce some key exchange protocols over noncommutative rings. These protocols us...
In this paper we introduce some key exchange protocols over noncommutative rings. These protocols us...
International audienceRecent advances in lattice cryptography, mainly stemming from the development ...
Authentication is a process by which an entity, which could be a person or intended computer, establ...
This work is focused on the description of one verifiable encryption scheme, specifically a zero-kno...
Many of the asymmetric cryptography protocols are based on operations performed on commutative algeb...
We present the noncommutative version of the Polly Cracker cryptosystem, which is more promising tha...
Algebra is one of the important fields of mathematics. It concerns with the study and manipulation o...
We propose building a new PKC in a ring structure, the classification of rings being an open problem...
In this paper we use the nonrepresentable ring E_p(m) to introduce public key cryptosystems in nonco...
In this paper we introduce some key exchange protocols over noncommutative rings. These protocols us...
The Learning with Errors (LWE) problem is the fundamental backbone of modern lattice-based cryptogra...
This work is focused on the description of one verifiable encryption scheme, specifically a zero-kno...
Multivariate Public Key Cryptosystems (MPKC) can be potentially applied to post-quantum cryptography...
Post-quantum cryptography (PQC) is a trend that has a deserved NIST status, and which aims to be res...
In this paper we introduce some key exchange protocols over noncommutative rings. These protocols us...
In this paper we introduce some key exchange protocols over noncommutative rings. These protocols us...
International audienceRecent advances in lattice cryptography, mainly stemming from the development ...
Authentication is a process by which an entity, which could be a person or intended computer, establ...
This work is focused on the description of one verifiable encryption scheme, specifically a zero-kno...
Many of the asymmetric cryptography protocols are based on operations performed on commutative algeb...
We present the noncommutative version of the Polly Cracker cryptosystem, which is more promising tha...
Algebra is one of the important fields of mathematics. It concerns with the study and manipulation o...