This paper considers the application of group theory to cryptography using a nonabelian infinite group (the braid group). The practical application of cryptographic protocols are determined by their security and feasibility. Both research papers and experiments will be used to measure feasibility and security of the protocol, with the intention of ultimately deeming the protocol either effective or ineffective. Having secure cryptography is vital to providing anonymity, confidentiality and integrity to data and as the quantum threat creeps towards us, the ever greater importance of new secure cryptography is becoming clear
Proceedings of: TCC 2005: Theory of Cryptography Conference, 10-12 February 2005, Cambridge, MA, USA...
In this thesis we describe how various rewriting methods in combinatorial group theory can be used t...
Braid groups are infinite non-abelian groups naturally arising from geometric braids. For two decade...
In this expository article we present an overview of the current state-of-the-art in post-quantum gr...
In this research we propose new protocols in group-based cryptography contributing to the research o...
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric brai...
Known proposals for key establishment schemes based on combinatorial group theory are often formulat...
This book is about relations between three different areas of mathematics and theoretical computer s...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
Abstract. The braid groups are infinite non-commutative groups nat-urally arising from geometric bra...
From the Washington University Senior Honors Thesis Abstracts (WUSHTA), 2017. Published by the Offic...
We present variants of the signature schemes of GuillouQuisquater ElGamal and Schnorr whose securi...
Public-key solutions based on number theory, including RSA, ECC, and Diffie-Hellman, are subject to ...
Abstract. Motivated by cryptographic applications, we study subgroups of braid groups Bn generated b...
Proceedings of: TCC 2005: Theory of Cryptography Conference, 10-12 February 2005, Cambridge, MA, USA...
Proceedings of: TCC 2005: Theory of Cryptography Conference, 10-12 February 2005, Cambridge, MA, USA...
In this thesis we describe how various rewriting methods in combinatorial group theory can be used t...
Braid groups are infinite non-abelian groups naturally arising from geometric braids. For two decade...
In this expository article we present an overview of the current state-of-the-art in post-quantum gr...
In this research we propose new protocols in group-based cryptography contributing to the research o...
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric brai...
Known proposals for key establishment schemes based on combinatorial group theory are often formulat...
This book is about relations between three different areas of mathematics and theoretical computer s...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
Abstract. The braid groups are infinite non-commutative groups nat-urally arising from geometric bra...
From the Washington University Senior Honors Thesis Abstracts (WUSHTA), 2017. Published by the Offic...
We present variants of the signature schemes of GuillouQuisquater ElGamal and Schnorr whose securi...
Public-key solutions based on number theory, including RSA, ECC, and Diffie-Hellman, are subject to ...
Abstract. Motivated by cryptographic applications, we study subgroups of braid groups Bn generated b...
Proceedings of: TCC 2005: Theory of Cryptography Conference, 10-12 February 2005, Cambridge, MA, USA...
Proceedings of: TCC 2005: Theory of Cryptography Conference, 10-12 February 2005, Cambridge, MA, USA...
In this thesis we describe how various rewriting methods in combinatorial group theory can be used t...
Braid groups are infinite non-abelian groups naturally arising from geometric braids. For two decade...