In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (non-commutative) skew polynomials. The algorithm performs only polynomial multiplications in a special small field and is very efficient. The security of the scheme can be interpretated in terms of solving binary quadratic equations or exhaustive search of a set obtained through linear equations. We give an evaluation of the security in terms of precise experimental heuristics and usual bounds based on Groebner basis solvers. We also derive an El Gamal like encryption protocol. We propose parameters which give 3600 bits exchanged for the key exchange protocol and a size of key of 3600 bits for the encryption protocol, with a complexity of rough...
Public-key encryption enables secure communication over an insecure network. In this thesis, we disc...
Many of the asymmetric cryptography protocols are based on operations performed on commutative algeb...
The Diffie-Hellman key exchange algorithm can be implemented using the group of points on an ellipti...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
International audienceTen years ago, Ko et al. described a Diffie-Hellman like protocol based on dec...
International audienceTen years ago, Ko et al. described a Diffie-Hellman like protocol based on dec...
We describe an attack on the family of Diffie-Hellman and El-Gamal like cryptosystems recently prese...
Exchanging cryptographic keys has been a problem with respect to security. Whitfield Diffie and Mart...
Abstract The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-...
The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primit...
I propose the new key distribution system and attribute-based encryption scheme on non-commutative r...
This paper proposes a new block encryption algorithm for cryptographic information protection. It de...
Multikey fully homomorphic encryption proposed by Lopez-Alt et al. (STOC12) is a significant primiti...
Abstract — Since the publication of Diffie-Hellman algorithm for two-party key exchange in 1976, the...
Public-key encryption enables secure communication over an insecure network. In this thesis, we disc...
Many of the asymmetric cryptography protocols are based on operations performed on commutative algeb...
The Diffie-Hellman key exchange algorithm can be implemented using the group of points on an ellipti...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (no...
International audienceTen years ago, Ko et al. described a Diffie-Hellman like protocol based on dec...
International audienceTen years ago, Ko et al. described a Diffie-Hellman like protocol based on dec...
We describe an attack on the family of Diffie-Hellman and El-Gamal like cryptosystems recently prese...
Exchanging cryptographic keys has been a problem with respect to security. Whitfield Diffie and Mart...
Abstract The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-...
The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primit...
I propose the new key distribution system and attribute-based encryption scheme on non-commutative r...
This paper proposes a new block encryption algorithm for cryptographic information protection. It de...
Multikey fully homomorphic encryption proposed by Lopez-Alt et al. (STOC12) is a significant primiti...
Abstract — Since the publication of Diffie-Hellman algorithm for two-party key exchange in 1976, the...
Public-key encryption enables secure communication over an insecure network. In this thesis, we disc...
Many of the asymmetric cryptography protocols are based on operations performed on commutative algeb...
The Diffie-Hellman key exchange algorithm can be implemented using the group of points on an ellipti...