In the presented work we focus on applications of decision problems from combinatorial group theory. Namely we analyse the Shpilrain-Zapata pro- tocol. We give formal proof that small cancellation groups are good platform for the protocol because the word problem is solvable in linear time and they are generic. We also analyse the complexity of the brute force attack on the protocol and show that in a theoretical way the protocol is immune to attack by adversary with arbitrary computing power
Abstract. We show that the decisional version of the Ko-Lee assumption for braid groups put forward ...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
We present decidability results for the verification of cryptographic protocols in the presence of e...
In the presented work we focus on applications of decision problems from combinatorial group theory....
This book is about relations between three different areas of mathematics and theoretical computer s...
There are several public key establishment protocols as well as complete public key cryptosys-tems b...
In questa tesi, ho focalizzato la mia attenzione sulla teoria della computazione e le sue relazioni ...
In this thesis we describe how various rewriting methods in combinatorial group theory can be used t...
We analyze and critique the public-key cryptosystem, based on combinatorial group theory, that was ...
In the Crypto'07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computati...
We present variants of the signature schemes of GuillouQuisquater ElGamal and Schnorr whose securi...
Abstract. After some excitement generated by recently suggested public key exchange protocols due to...
Known proposals for key establishment schemes basing on combinatorial group theory are often formul...
In this thesis we present new results in two areas – cryptographic protocols and lattice problems. •...
International audienceWe address the problem of speeding up group computations in cryptography using...
Abstract. We show that the decisional version of the Ko-Lee assumption for braid groups put forward ...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
We present decidability results for the verification of cryptographic protocols in the presence of e...
In the presented work we focus on applications of decision problems from combinatorial group theory....
This book is about relations between three different areas of mathematics and theoretical computer s...
There are several public key establishment protocols as well as complete public key cryptosys-tems b...
In questa tesi, ho focalizzato la mia attenzione sulla teoria della computazione e le sue relazioni ...
In this thesis we describe how various rewriting methods in combinatorial group theory can be used t...
We analyze and critique the public-key cryptosystem, based on combinatorial group theory, that was ...
In the Crypto'07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computati...
We present variants of the signature schemes of GuillouQuisquater ElGamal and Schnorr whose securi...
Abstract. After some excitement generated by recently suggested public key exchange protocols due to...
Known proposals for key establishment schemes basing on combinatorial group theory are often formul...
In this thesis we present new results in two areas – cryptographic protocols and lattice problems. •...
International audienceWe address the problem of speeding up group computations in cryptography using...
Abstract. We show that the decisional version of the Ko-Lee assumption for braid groups put forward ...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
We present decidability results for the verification of cryptographic protocols in the presence of e...