We propose a new computational problem over the noncommutative group, called the twin conjugacy search problem. This problem is related to the conjugacy search problem and can be used for almost all of the same cryptographic constructions that are based on the conjugacy search problem. However, our new problem is at least as hard as the conjugacy search problem. Moreover, the twin conjugacy search problem has many applications. One of the most important applications, we propose a trapdoor test which can replace the function of the decision oracle. We also show other applications of the problem, including: a non-interactive key exchange protocol and a key exchange protocol, a new encryption scheme which is secure against chosen ciphertext at...
This book is about relations between three different areas of mathematics and theoretical computer s...
Abstract. Since the development of the RSA cryptographic system by Rivest, Shamir, and Adleman, in 1...
In this paper we cryptanalyze two protocols: the Grigoriev–Shpilrain authentication protocol and a p...
The key exchange protocol is a method of securely sharing cryptographic keys over a public channel. ...
The field in nonabelian group-based cryptosystem have gain attention of the researchers as it expect...
In this article, we present a new key exchange protocol which works in the division semiring. We pro...
In this paper we cryptanalyze two protocols: Grigoriev-Shpilrain authentication protocol and Wang et...
We demonstrate that recent advances in the theory of braid groups, in particular a new invariant of ...
Abstract. After some excitement generated by recently suggested public key exchange protocols due to...
Machine learning and pattern recognition techniques have been successfully applied to algorithmic pr...
Machine learning and pattern recognition techniques have been successfully applied to algorithmic pr...
Abstract. We propose a new digital signature scheme based on a non-commutative group where the conju...
We propose a new computational problem and call it the twin bilinear Diffie-Hellman inversion (BDHI)...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
This book is about relations between three different areas of mathematics and theoretical computer s...
Abstract. Since the development of the RSA cryptographic system by Rivest, Shamir, and Adleman, in 1...
In this paper we cryptanalyze two protocols: the Grigoriev–Shpilrain authentication protocol and a p...
The key exchange protocol is a method of securely sharing cryptographic keys over a public channel. ...
The field in nonabelian group-based cryptosystem have gain attention of the researchers as it expect...
In this article, we present a new key exchange protocol which works in the division semiring. We pro...
In this paper we cryptanalyze two protocols: Grigoriev-Shpilrain authentication protocol and Wang et...
We demonstrate that recent advances in the theory of braid groups, in particular a new invariant of ...
Abstract. After some excitement generated by recently suggested public key exchange protocols due to...
Machine learning and pattern recognition techniques have been successfully applied to algorithmic pr...
Machine learning and pattern recognition techniques have been successfully applied to algorithmic pr...
Abstract. We propose a new digital signature scheme based on a non-commutative group where the conju...
We propose a new computational problem and call it the twin bilinear Diffie-Hellman inversion (BDHI)...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
This book is about relations between three different areas of mathematics and theoretical computer s...
Abstract. Since the development of the RSA cryptographic system by Rivest, Shamir, and Adleman, in 1...
In this paper we cryptanalyze two protocols: the Grigoriev–Shpilrain authentication protocol and a p...