International audienceTen years ago, Ko et al. described a Diffie-Hellman like protocol based on decomposition with respect to a non-commutative semigroup law. Instantiation with braid groups had first been considered, however intense research on braid groups revealed vulnerabilities of the group structure and of the braid based DH problem itself.Recently, Boucher et al. proposed a similar scheme based on a particular non-commutative multiplication of polynomials over a finite field. These so called skew polynomials have a well-studied theory and have many applications in mathematics and coding theory, however they are quite unknown in a cryptographic application.In this paper, we show that the Diffie-Hellman problem based on skew polynomia...
Modern communication relies on cryptography to ensure the security, integrity, and authenticity of o...
Abstract. Since the development of the RSA cryptographic system by Rivest, Shamir, and Adleman, in 1...
Abstract A new key agreement scheme based on the triple decomposition problem over non-commutative p...
International audienceTen years ago, Ko et al. described a Diffie-Hellman like protocol based on dec...
We describe an attack on the family of Diffie-Hellman and El-Gamal like cryptosystems recently prese...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
In this thesis, we study several cryptographic primitives of use in Diffie-Hellman like protocols. W...
This doctoral thesis is dedicated to improve a linear algebra attack on the so-called braid group-ba...
Many of the asymmetric cryptography protocols are based on operations performed on commutative algeb...
Abstract. We offer cryptanalysis of a key exchange scheme due to Stickel [11], which was inspired by...
Abstract The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-...
L'objet de cette thèse est l'étude de diverses primitives cryptographiques utiles dans des protocole...
Title: Diffie and Hellman are exchanging matrices over group rings Author: Romana Linkeová Departmen...
Modern communication relies on cryptography to ensure the security, integrity, and authenticity of o...
Abstract. Since the development of the RSA cryptographic system by Rivest, Shamir, and Adleman, in 1...
Abstract A new key agreement scheme based on the triple decomposition problem over non-commutative p...
International audienceTen years ago, Ko et al. described a Diffie-Hellman like protocol based on dec...
We describe an attack on the family of Diffie-Hellman and El-Gamal like cryptosystems recently prese...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
In this thesis, we study several cryptographic primitives of use in Diffie-Hellman like protocols. W...
This doctoral thesis is dedicated to improve a linear algebra attack on the so-called braid group-ba...
Many of the asymmetric cryptography protocols are based on operations performed on commutative algeb...
Abstract. We offer cryptanalysis of a key exchange scheme due to Stickel [11], which was inspired by...
Abstract The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-...
L'objet de cette thèse est l'étude de diverses primitives cryptographiques utiles dans des protocole...
Title: Diffie and Hellman are exchanging matrices over group rings Author: Romana Linkeová Departmen...
Modern communication relies on cryptography to ensure the security, integrity, and authenticity of o...
Abstract. Since the development of the RSA cryptographic system by Rivest, Shamir, and Adleman, in 1...
Abstract A new key agreement scheme based on the triple decomposition problem over non-commutative p...