The field in nonabelian group-based cryptosystem have gain attention of the researchers as it expected to offers higher security when confronted with quantum computational due to more complex algebraic structures. Hence, this paper intents to give an overview on Diffie-Hellman protocol considering the mathematically hard problem such as the conjugacy search problem in a group G. In this paper we provide examples for G of non abelian group particularly the group of SL(2,3)
In this paper we cryptanalyze two protocols: Grigoriev-Shpilrain authentication protocol and Wang et...
We investigate the computational complexity of the discrete logarithm, the computational Diffie-Hell...
In this paper we cryptanalyze two protocols: the Grigoriev–Shpilrain authentication protocol and a p...
We propose a new computational problem over the noncommutative group, called the twin conjugacy sear...
Abstract. After some excitement generated by recently suggested public key exchange protocols due to...
This book is about relations between three different areas of mathematics and theoretical computer s...
In this paper we study generalizations of the Diffie-Hellman problems recently used to construct cry...
In this paper we study generalizations of the Diffie-Hellman problems recently used to construct cry...
We demonstrate that recent advances in the theory of braid groups, in particular a new invariant of ...
The key exchange protocol is a method of securely sharing cryptographic keys over a public channel. ...
In this paper they study generalizations of the Diffie-Hellman problems recently used to construct c...
In this article, we present a new key exchange protocol which works in the division semiring. We pro...
We present a generalization of the Diffie-Hellman problem. It is based on the problem of determining...
This thesis deals with the conjugacy problem in groups and its twisted variants. We analyze recent r...
Abstract. We propose a new digital signature scheme based on a non-commutative group where the conju...
In this paper we cryptanalyze two protocols: Grigoriev-Shpilrain authentication protocol and Wang et...
We investigate the computational complexity of the discrete logarithm, the computational Diffie-Hell...
In this paper we cryptanalyze two protocols: the Grigoriev–Shpilrain authentication protocol and a p...
We propose a new computational problem over the noncommutative group, called the twin conjugacy sear...
Abstract. After some excitement generated by recently suggested public key exchange protocols due to...
This book is about relations between three different areas of mathematics and theoretical computer s...
In this paper we study generalizations of the Diffie-Hellman problems recently used to construct cry...
In this paper we study generalizations of the Diffie-Hellman problems recently used to construct cry...
We demonstrate that recent advances in the theory of braid groups, in particular a new invariant of ...
The key exchange protocol is a method of securely sharing cryptographic keys over a public channel. ...
In this paper they study generalizations of the Diffie-Hellman problems recently used to construct c...
In this article, we present a new key exchange protocol which works in the division semiring. We pro...
We present a generalization of the Diffie-Hellman problem. It is based on the problem of determining...
This thesis deals with the conjugacy problem in groups and its twisted variants. We analyze recent r...
Abstract. We propose a new digital signature scheme based on a non-commutative group where the conju...
In this paper we cryptanalyze two protocols: Grigoriev-Shpilrain authentication protocol and Wang et...
We investigate the computational complexity of the discrete logarithm, the computational Diffie-Hell...
In this paper we cryptanalyze two protocols: the Grigoriev–Shpilrain authentication protocol and a p...