Post-Quantum Cryptography (PQC) attempts to find cryptographic protocols resistant to attacks by means of for instance Shor's polynomial time algorithm for numerical field problems like integer factorization (IFP) or the discrete logarithm (DLP). Other aspects are the backdoors discovered in deterministic random generators or recent advances in solving some instances of DLP. The use of alternative algebraic structures like non-commutative or non-associative partial groupoids, magmas, monoids, semigroups, quasigroups or groups, are valid choices for these new kinds of protocols. In this paper, we focus in an asymmetric cipher based on a generalized ElGamal non-arbitrated protocol using a non-commutative general linear group. The developed pr...
A recent series of works (Hecht, IACR ePrint, 2020–2021) propose to build post-quantum public-key en...
In this paper, we present an original algorithm to generate session keys and a subsequent generalize...
International audienceDiffie-Hellman key exchange is at the foundations of public-key cryptography, ...
In this expository article we present an overview of the current state-of-the-art in post-quantum gr...
In this research we propose new protocols in group-based cryptography contributing to the research o...
ElGamal cryptosystem has emerged as one of the most important construction in Public Key Cryptograph...
Abstract The quantum computing paradigm is fundamentally different from the classical one. There ar...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
This book is about relations between three different areas of mathematics and theoretical computer s...
Many of the asymmetric cryptography protocols are based on operations performed on commutative algeb...
The intersection of Non-commutative and Multivariate cryptography contains studies of cryptograp...
A candidate for practical post-quantum digital signature algorithm based on computational difficulty...
We propose a polynomial time quantum algorithm for solving the discrete logarithm problem in matrice...
Expanding graphs are known due to their remarkable applications to Computer Science. We are looking ...
When building cryptosystems, cryptographers focus on finding problems that are not believed to be so...
A recent series of works (Hecht, IACR ePrint, 2020–2021) propose to build post-quantum public-key en...
In this paper, we present an original algorithm to generate session keys and a subsequent generalize...
International audienceDiffie-Hellman key exchange is at the foundations of public-key cryptography, ...
In this expository article we present an overview of the current state-of-the-art in post-quantum gr...
In this research we propose new protocols in group-based cryptography contributing to the research o...
ElGamal cryptosystem has emerged as one of the most important construction in Public Key Cryptograph...
Abstract The quantum computing paradigm is fundamentally different from the classical one. There ar...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
This book is about relations between three different areas of mathematics and theoretical computer s...
Many of the asymmetric cryptography protocols are based on operations performed on commutative algeb...
The intersection of Non-commutative and Multivariate cryptography contains studies of cryptograp...
A candidate for practical post-quantum digital signature algorithm based on computational difficulty...
We propose a polynomial time quantum algorithm for solving the discrete logarithm problem in matrice...
Expanding graphs are known due to their remarkable applications to Computer Science. We are looking ...
When building cryptosystems, cryptographers focus on finding problems that are not believed to be so...
A recent series of works (Hecht, IACR ePrint, 2020–2021) propose to build post-quantum public-key en...
In this paper, we present an original algorithm to generate session keys and a subsequent generalize...
International audienceDiffie-Hellman key exchange is at the foundations of public-key cryptography, ...