Abstract. After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that the conjugacy search problem is unlikely to provide sufficient level of security if a braid group is used as the platform. In this paper we address the following questions: (1) whether choosing a different group, or a class of groups, can remedy the situation; (2) whether some other “hard ” problem from combinatorial group theory can be used, instead of the conjugacy search problem, in a public key exchange protocol. Another question that we address here, although somewhat vague, is likely to become a focus of the future research in public key cryptography based on ...
In this article, we present a new key exchange protocol which works in the division semiring. We pro...
The field in nonabelian group-based cryptosystem have gain attention of the researchers as it expect...
Braid Groups have recently been considered for use in Public-Key Cryptographic Systems. The most not...
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric brai...
Abstract. The braid groups are infinite non-commutative groups nat-urally arising from geometric bra...
We demonstrate that recent advances in the theory of braid groups, in particular a new invariant of ...
Artin's braid groups have been recently suggested as a new source for public-key cryptography. ...
Abstract. Braid cryptosystem was proposed in CRYPTO 2000 as an alternate public-key cryptosystem. Th...
We analyze and critique the public-key cryptosystem, based on combinatorial group theory, that was ...
Known proposals for key establishment schemes basing on combinatorial group theory are often formul...
This book is about relations between three different areas of mathematics and theoretical computer s...
There are several public key establishment protocols as well as complete public key cryptosys-tems b...
The key exchange protocol is a method of securely sharing cryptographic keys over a public channel. ...
In this paper we cryptanalyze two protocols: Grigoriev-Shpilrain authentication protocol and Wang et...
Abstract. Since the development of the RSA cryptographic system by Rivest, Shamir, and Adleman, in 1...
In this article, we present a new key exchange protocol which works in the division semiring. We pro...
The field in nonabelian group-based cryptosystem have gain attention of the researchers as it expect...
Braid Groups have recently been considered for use in Public-Key Cryptographic Systems. The most not...
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric brai...
Abstract. The braid groups are infinite non-commutative groups nat-urally arising from geometric bra...
We demonstrate that recent advances in the theory of braid groups, in particular a new invariant of ...
Artin's braid groups have been recently suggested as a new source for public-key cryptography. ...
Abstract. Braid cryptosystem was proposed in CRYPTO 2000 as an alternate public-key cryptosystem. Th...
We analyze and critique the public-key cryptosystem, based on combinatorial group theory, that was ...
Known proposals for key establishment schemes basing on combinatorial group theory are often formul...
This book is about relations between three different areas of mathematics and theoretical computer s...
There are several public key establishment protocols as well as complete public key cryptosys-tems b...
The key exchange protocol is a method of securely sharing cryptographic keys over a public channel. ...
In this paper we cryptanalyze two protocols: Grigoriev-Shpilrain authentication protocol and Wang et...
Abstract. Since the development of the RSA cryptographic system by Rivest, Shamir, and Adleman, in 1...
In this article, we present a new key exchange protocol which works in the division semiring. We pro...
The field in nonabelian group-based cryptosystem have gain attention of the researchers as it expect...
Braid Groups have recently been considered for use in Public-Key Cryptographic Systems. The most not...