-
1
-
-
84937563572
-
New key agreement protocols in braid group cryptography
-
CT-RSA 2001
-
I. Anshel, M. Anshel, B. Fisher, and D. Goldfeld, "New key agreement protocols in braid group cryptography," CT-RSA 2001, LNCS 2020, pp. 13-27, 2001.
-
(2001)
LNCS
, vol.2020
, pp. 13-27
-
-
Anshel, I.1
Anshel, M.2
Fisher, B.3
Goldfeld, D.4
-
2
-
-
0033245872
-
An algebraic method for public-key cryptography
-
I. Anshel, M. Anshel, and D. Goldfeld, "An algebraic method for public-key cryptography," Math. Res. Lett., vol.6, pp.287-291, 1999.
-
(1999)
Math. Res. Lett.
, vol.6
, pp. 287-291
-
-
Anshel, I.1
Anshel, M.2
Goldfeld, D.3
-
3
-
-
0003248449
-
Braids, links and the mapping class group
-
Princeton Univ. Press
-
J. Birman, Braids, links and the mapping class group, Ann. Math. Studies 82, Princeton Univ. Press, 1975.
-
(1975)
Ann. Math. Studies
, vol.82
-
-
Birman, J.1
-
4
-
-
0001131295
-
A new approaches to the world and conjugacy problem in the braid groups
-
J.S. Birman, K.H. Ko, and S.J. Lee, "A new approaches to the world and conjugacy problem in the braid groups," Adv. Math., vol.139, no.2, pp.322-353, 1998.
-
(1998)
Adv. Math.
, vol.139
, Issue.2
, pp. 322-353
-
-
Birman, J.S.1
Ko, K.H.2
Lee, S.J.3
-
5
-
-
84956858846
-
Cryptanalysis of two cryptosystems based on group actions
-
ASIACRYPT '99
-
S.R. Blackburn, "Cryptanalysis of two cryptosystems based on group actions," ASIACRYPT '99, LNCS 1716, pp.52-61, 1999.
-
(1999)
LNCS
, vol.1716
, pp. 52-61
-
-
Blackburn, S.R.1
-
6
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudorandom bits
-
M. Blum and S. Micali, "How to generate cryptographically strong sequences of pseudorandom bits," SIAM J. Comput., vol.13, pp.850-864, 1984.
-
(1984)
SIAM J. Comput.
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
7
-
-
84946826517
-
An efficient implementation of braid groups
-
ASIACRYPT 2001
-
J.C. Cha, K.H. Ko, S.J. Lee, J.W. Han, and J.H. Cheon, "An efficient implementation of braid groups," ASIACRYPT 2001, LNCS 2248, pp.144-156, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 144-156
-
-
Cha, J.C.1
Ko, K.H.2
Lee, S.J.3
Han, J.W.4
Cheon, J.H.5
-
8
-
-
33746568769
-
A polynomial time algorithm for the braid Diffie-Hellman conjugacy problem
-
CRYPTO 2003
-
J.H. Cheon and B. Jun, "A polynomial time algorithm for the braid Diffie-Hellman conjugacy problem," CRYPTO 2003, LNCS 2729, pp.212-225, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 212-225
-
-
Cheon, J.H.1
Jun, B.2
-
10
-
-
0000906878
-
A fast method for comparing braids
-
P. Dehornoy, "A fast method for comparing braids," Adv. Math., vol.123, pp.205-235, 1997.
-
(1997)
Adv. Math.
, vol.123
, pp. 205-235
-
-
Dehornoy, P.1
-
11
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M.E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol.22, no.6, pp.644-654, 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
12
-
-
0000948525
-
Algorithms for positive braids
-
E.A. Elrifai and H.R. Morton, "Algorithms for positive braids," Quart. J. Math. Oxford Ser.(2), vol.45, no.180, pp.479-497, 1994.
-
(1994)
Quart. J. Math. Oxford Ser.(2)
, vol.45
, Issue.180
, pp. 479-497
-
-
Elrifai, E.A.1
Morton, H.R.2
-
13
-
-
0003848050
-
-
Jones and Barlett, Boston and London
-
D.B.A. Epstein, J.W. Cannon, D.F. Holt, S.V.F. Levy, M.S. Patterson, and W. Thurston, Word processing in groups, Jones and Barlett, Boston and London, 1992.
-
(1992)
Word Processing in Groups
-
-
Epstein, D.B.A.1
Cannon, J.W.2
Holt, D.F.3
Levy, S.V.F.4
Patterson, M.S.5
Thurston, W.6
-
14
-
-
18744373086
-
-
Preprint
-
D. Garber, S. Kaplan, M. Teicher, B. Tsaban, and U. Vishne, "Length-based conjugacy search in the braid group," Preprint, Available at www.arxiv.org/math.GR/0209267
-
Length-based Conjugacy Search in the Braid Group
-
-
Garber, D.1
Kaplan, S.2
Teicher, M.3
Tsaban, B.4
Vishne, U.5
-
15
-
-
84947206956
-
Cryptanalysis of a pseudorandom generator based on braid groups
-
EUROCRYPT 2002
-
R. Gennaro and D. Micciancio, "Cryptanalysis of a pseudorandom generator based on braid groups," EUROCRYPT 2002. LNCS 2332, pp.1-13, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 1-13
-
-
Gennaro, R.1
Micciancio, D.2
-
17
-
-
0042969274
-
Complexity of the generalized conjugacy problem
-
S.G. Hahn, E. Lee, and J.H. Park, "Complexity of the generalized conjugacy problem," Discrete Appl. Math., vol.130, no.1, pp.33-36, 2003.
-
(2003)
Discrete Appl. Math.
, vol.130
, Issue.1
, pp. 33-36
-
-
Hahn, S.G.1
Lee, E.2
Park, J.H.3
-
18
-
-
35248884293
-
A practical attack on some braid group based cryptographic primitives
-
PKC 2003
-
D. Hofheinz and R. Steinwandt, "A practical attack on some braid group based cryptographic primitives," PKC 2003, LNCS 2567, pp.187-198, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 187-198
-
-
Hofheinz, D.1
Steinwandt, R.2
-
19
-
-
84947423684
-
A linear algebraic attack on the AAFG1 braid group cryptosystem
-
ACISP 2002
-
J. Hughes, "A linear algebraic attack on the AAFG1 braid group cryptosystem," ACISP 2002, LNCS 2384, pp. 176-189, 2002.
-
(2002)
LNCS
, vol.2384
, pp. 176-189
-
-
Hughes, J.1
-
21
-
-
84974622583
-
New public-key cryptosystem using braid groups
-
Crypto 2000
-
K.H. Ko, S.J. Lee, J.H. Cheon, J.W. Han, J.S. Kang, and C. Park, "New public-key cryptosystem using braid groups," Crypto 2000, LNCS 1880, pp.166-183, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 166-183
-
-
Ko, K.H.1
Lee, S.J.2
Cheon, J.H.3
Han, J.W.4
Kang, J.S.5
Park, C.6
-
22
-
-
2642565923
-
Braid groups are linear
-
D. Krammer, "Braid groups are linear," Ann. Math., vol.142, pp.451-486, 2002.
-
(2002)
Ann. Math.
, vol.142
, pp. 451-486
-
-
Krammer, D.1
-
23
-
-
56749171805
-
Potential weaknesses of the commutator key agreement protocol based on braid groups
-
EUROCRYPT 2002
-
S.J. Lee and E. Lee, "Potential weaknesses of the commutator key agreement protocol based on braid groups," EUROCRYPT 2002, LNCS 2332, pp. 14-28, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 14-28
-
-
Lee, S.J.1
Lee, E.2
-
24
-
-
84880879949
-
Pseudorandomness from braid groups
-
CRYPTO 2001
-
E. Lee, S.J. Lee, and S.G. Hahn, "Pseudorandomness from braid groups," CRYPTO 2001, LNCS 2139, pp.486-502, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 486-502
-
-
Lee, E.1
Lee, S.J.2
Hahn, S.G.3
-
25
-
-
35248855465
-
Cryptanalysis of the public-key encryption based on braid groups
-
EUROCRYPT 2003
-
E. Lee and J.H. Park, "Cryptanalysis of the public-key encryption based on braid groups," EUROCRYPT 2003, LNCS 2565, pp.477-490, 2003.
-
(2003)
LNCS
, vol.2565
, pp. 477-490
-
-
Lee, E.1
Park, J.H.2
-
26
-
-
0142165948
-
New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups
-
S.S. Magliveras, D.R. Stinson, and T. van Trung, "New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups," J. Cryptology, vol.15, no.4, pp.285-297, 2002.
-
(2002)
J. Cryptology
, vol.15
, Issue.4
, pp. 285-297
-
-
Magliveras, S.S.1
Stinson, D.R.2
Van Trung, T.3
-
27
-
-
84880894046
-
New public key cryptosystem using finite non Abelian groups
-
CRYPTO 2001
-
S.H. Paeng, K.C. Ha, J.H. Kim, S. Chee, and C. Park, "New public key cryptosystem using finite non Abelian groups," CRYPTO 2001, LNCS 2139, pp.470-485, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 470-485
-
-
Paeng, S.H.1
Ha, K.C.2
Kim, J.H.3
Chee, S.4
Park, C.5
-
28
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
P.W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM J. Comput., vol.26, pp. 1484-1509, 1997.
-
(1997)
SIAM J. Comput.
, vol.26
, pp. 1484-1509
-
-
Shor, P.W.1
-
29
-
-
2642530130
-
Security analysis of the MOR cryptosystem
-
PKC 2003
-
C. Tobias, "Security analysis of the MOR cryptosystem," PKC 2003, LNCS 2567, pp.175-186, 2003.
-
(2003)
LNCS
, vol.2567
, pp. 175-186
-
-
Tobias, C.1
-
30
-
-
85034665565
-
A public-key cryptosystem based on the word problem
-
CRYPTO '84
-
N.R. Wagner and M.R. Magyarik, "A public-key cryptosystem based on the word problem," CRYPTO '84, LNCS 196, pp.19-36, 1985.
-
(1985)
LNCS
, vol.196
, pp. 19-36
-
-
Wagner, N.R.1
Magyarik, M.R.2
-
31
-
-
2642561859
-
Quantum computers: The end of public-key cryptography?
-
V. Wheatman and L. McRory, "Quantum computers: The end of public-key cryptography?," Gartner research note, 2002. Available at www.gartner.com/DisplayDocument?doc_cd=103628
-
(2002)
Gartner Research Note
-
-
Wheatman, V.1
McRory, L.2
-
32
-
-
0007847747
-
The genus of closed 3-braids
-
P.J. Xu, "The genus of closed 3-braids." J. Knot Theory Ramifications, vol.1, no.3, pp.303-326, 1992.
-
(1992)
J. Knot Theory Ramifications
, vol.1
, Issue.3
, pp. 303-326
-
-
Xu, P.J.1
-
33
-
-
84958977048
-
Public-key cryptosystems using the modular group
-
PKC '98
-
A. Yamamura, "Public-key cryptosystems using the modular group," PKC '98, LNCS 1431, pp.203-216, 1998.
-
(1998)
LNCS
, vol.1431
, pp. 203-216
-
-
Yamamura, A.1
-
34
-
-
22644448513
-
A functional cryptosystem using a group action
-
ACISP '99
-
A. Yamamura, "A functional cryptosystem using a group action," ACISP '99, LNCS 1587, pp.314-325, 1999.
-
(1999)
LNCS
, vol.1587
, pp. 314-325
-
-
Yamamura, A.1
|