Around two years ago, Roman\u27kov introduced a new type of attack called the nonlinear decomposition attack on groups with solvable membership search problem. To analyze the precise efficiency of the algorithm, we implemented the algorithm on two protocols: semidirect product protocol and Ko-Lee protocol. Because polycyclic groups were suggested as possible platform groups in the semidirect product protocol and polycyclic groups have a solvable membership search problem, we used poly- cyclic groups as the platform group to test the attack. While the complexity could vary regarding many different factors within the group, there was always at least one exponential factor in the complexity analysis of the algorithm
The key exchange protocol is a method of securely sharing cryptographic keys over a public channel. ...
Let F be a finitely generated free group and Aut(F) its group of automorphisms. In this monograph we...
Let F be a finitely generated free group and Aut(F) its group of automorphisms. In this monograph we...
Around two years ago, Roman\u27kov introduced a new type of attack called the nonlinear decompositio...
In this work, my advisor Delaram Kahrobaei, our collaborator David Garber, and I explore polycyclic ...
In this work, my advisor Delaram Kahrobaei, our collaborator David Garber, and I explore polycyclic ...
The Anshel–Anshel–Goldfeld (AAG) key-exchange protocol was implemented and studied with the braid gr...
The Anshel–Anshel–Goldfeld (AAG) key-exchange protocol was implemented and studied with the braid gr...
The Anshel–Anshel–Goldfeld (AAG) key-exchange protocol was implemented and studied with the braid gr...
We present evidence why the Burnside groups of exponent 3 could be a good candidate for a platform g...
We present evidence why the Burnside groups of exponent 3 could be a good candidate for a platform g...
In this thesis we describe how various rewriting methods in combinatorial group theory can be used t...
In this thesis we describe how various rewriting methods in combinatorial group theory can be used t...
In this paper we present a new key establishment protocol based on the decomposition problem in non-...
This book is about relations between three different areas of mathematics and theoretical computer s...
The key exchange protocol is a method of securely sharing cryptographic keys over a public channel. ...
Let F be a finitely generated free group and Aut(F) its group of automorphisms. In this monograph we...
Let F be a finitely generated free group and Aut(F) its group of automorphisms. In this monograph we...
Around two years ago, Roman\u27kov introduced a new type of attack called the nonlinear decompositio...
In this work, my advisor Delaram Kahrobaei, our collaborator David Garber, and I explore polycyclic ...
In this work, my advisor Delaram Kahrobaei, our collaborator David Garber, and I explore polycyclic ...
The Anshel–Anshel–Goldfeld (AAG) key-exchange protocol was implemented and studied with the braid gr...
The Anshel–Anshel–Goldfeld (AAG) key-exchange protocol was implemented and studied with the braid gr...
The Anshel–Anshel–Goldfeld (AAG) key-exchange protocol was implemented and studied with the braid gr...
We present evidence why the Burnside groups of exponent 3 could be a good candidate for a platform g...
We present evidence why the Burnside groups of exponent 3 could be a good candidate for a platform g...
In this thesis we describe how various rewriting methods in combinatorial group theory can be used t...
In this thesis we describe how various rewriting methods in combinatorial group theory can be used t...
In this paper we present a new key establishment protocol based on the decomposition problem in non-...
This book is about relations between three different areas of mathematics and theoretical computer s...
The key exchange protocol is a method of securely sharing cryptographic keys over a public channel. ...
Let F be a finitely generated free group and Aut(F) its group of automorphisms. In this monograph we...
Let F be a finitely generated free group and Aut(F) its group of automorphisms. In this monograph we...