Public-key solutions based on number theory, including RSA, ECC, and Diffie-Hellman, are subject to various quantum attacks, which makes such solutions less attractive long term. Certain group theoretic constructs, however, show promise in providing quantum-resistant cryptographic primitives because of the infinite, non-cyclic, non-abelian nature of the underlying mathematics. This paper introduces Kayawood Key Agreement protocol (Kayawood, or Kayawood KAP), a new group-theoretic key agreement protocol, that leverages the known NP-Hard shortest word problem (among others) to provide an Elgamal-style, Diffie-Hellman-like method. This paper also (i) discusses the implementation of and behavioral aspects of Kayawood, (ii) introduces new met...
Progress in quantum technologies forces the development of new cryptographic primitives that are res...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...
The emergence of practical quantum computers poses a significant threat to the most popular public k...
We analyze security properties of a two-party key-agreement protocol recently proposed by I. Anshel,...
We analyze security properties of a two-party key-agreement protocol recently proposed by I. Anshel,...
In 2016, NIST announced an open competition with the goal of finding and standardizing a suitable qu...
In this paper, we present an original algorithm to generate session keys and a subsequent generalize...
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric brai...
Known proposals for key establishment schemes based on combinatorial group theory are often formulat...
This paper considers the application of group theory to cryptography using a nonabelian infinite gro...
In this expository article we present an overview of the current state-of-the-art in post-quantum gr...
Abstract A new key agreement scheme based on the triple decomposition problem over non-commutative p...
International audienceDiffie-Hellman key exchange is at the foundations of public-key cryptography, ...
We propose a polynomial time quantum algorithm for solving the discrete logarithm problem in matrice...
Abstract. The braid groups are infinite non-commutative groups nat-urally arising from geometric bra...
Progress in quantum technologies forces the development of new cryptographic primitives that are res...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...
The emergence of practical quantum computers poses a significant threat to the most popular public k...
We analyze security properties of a two-party key-agreement protocol recently proposed by I. Anshel,...
We analyze security properties of a two-party key-agreement protocol recently proposed by I. Anshel,...
In 2016, NIST announced an open competition with the goal of finding and standardizing a suitable qu...
In this paper, we present an original algorithm to generate session keys and a subsequent generalize...
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric brai...
Known proposals for key establishment schemes based on combinatorial group theory are often formulat...
This paper considers the application of group theory to cryptography using a nonabelian infinite gro...
In this expository article we present an overview of the current state-of-the-art in post-quantum gr...
Abstract A new key agreement scheme based on the triple decomposition problem over non-commutative p...
International audienceDiffie-Hellman key exchange is at the foundations of public-key cryptography, ...
We propose a polynomial time quantum algorithm for solving the discrete logarithm problem in matrice...
Abstract. The braid groups are infinite non-commutative groups nat-urally arising from geometric bra...
Progress in quantum technologies forces the development of new cryptographic primitives that are res...
Abstract: Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecur...
The emergence of practical quantum computers poses a significant threat to the most popular public k...