-
1
-
-
84937563572
-
New Key Agreement Protocols in Braid Group Cryptography
-
Topics in Cryptology - CT-RSA 2001, Springer-Verlag
-
I. Anshel, M. Anshel, B. Fisher, and D. Goldfeld, New Key Agreement Protocols in Braid Group Cryptography. Topics in Cryptology - CT-RSA 2001, Lecture Notes in Computer Science 2020, Springer-Verlag, pp. 13-27, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2020
, pp. 13-27
-
-
Anshel, I.1
Anshel, M.2
Fisher, B.3
Goldfeld, D.4
-
2
-
-
0033245872
-
An algebraic method for public-key cryptography
-
I. Anshel, M. Anshel, and D. Goldfeld, An algebraic method for public-key cryptography. Mathematical Research Letters 6, pp. 287-291, 1999.
-
(1999)
Mathematical Research Letters
, vol.6
, pp. 287-291
-
-
Anshel, I.1
Anshel, M.2
Goldfeld, D.3
-
3
-
-
84946826517
-
An Efficient Implementation of Braid Groups
-
Advances in Cryptology - ASIACRYPT 2001, Springer-Verlag
-
J.C. Cha, K.H. Ko, S.J. Lee, J.W. Han, and J.H. Cheon, An Efficient Implementation of Braid Groups. Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Computer Science 2248, Springer-Verlag, pp.144-156, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 144-156
-
-
Cha, J.C.1
Ko, K.H.2
Lee, S.J.3
Han, J.W.4
Cheon, J.H.5
-
4
-
-
0004116989
-
-
The MIT Press
-
T.H. Cormen, C.E. Leiserson, R.L. Rivest, C. Stein, Introduction to Algorithms, 2nd Edition, The MIT Press, 2001.
-
(2001)
Introduction to Algorithms, 2nd Edition
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
5
-
-
84947206956
-
Cryptanalysis of a pseudorandom generator based on braid groups
-
Advances in Cryptology - EUROCRYPT 2002, Springer-Verlag
-
R. Gennaro and D. Micciancio, Cryptanalysis of a pseudorandom generator based on braid groups. Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science 2332, Springer-Verlag, pp. 1-13, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 1-13
-
-
Gennaro, R.1
Micciancio, D.2
-
6
-
-
0042969274
-
Complexity of the Generalized Conjugacy Problem
-
S.G. Hahn, E. Lee, and J.H. Park, Complexity of the Generalized Conjugacy Problem. To appear in Discrete Applied Mathematics. Available at http://crypt.kaist.ac.kr/pre_papers/DA5640.ps.
-
Discrete Applied Mathematics
-
-
Hahn, S.G.1
Lee, E.2
Park, J.H.3
-
7
-
-
84947808606
-
NTRU: A Ring based Publick Key Cryptosystem
-
Algorithmic Number Theory Symposium - ANTS III, Springer-Verlag
-
J. Hoffstein, J. Pipher, and J.H. Silverman, NTRU: a Ring based Publick Key Cryptosystem. Algorithmic Number Theory Symposium - ANTS III, Lecture Notes in Computer Science 1423, Springer-Verlag, pp. 267-288, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1423
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.H.3
-
8
-
-
35248884293
-
A Practical Attack on Some Braid Group Based Cryptographic Primitives
-
Public Key Cryptography - PKC 2003, Springer-Verlag
-
D. Hofheinz and R. Steinwandt, A Practical Attack on Some Braid Group Based Cryptographic Primitives, Public Key Cryptography - PKC 2003, Lecture Notes in Computer Science 2567, Springer-Verlag, pp. 187-198, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2567
, pp. 187-198
-
-
Hofheinz, D.1
Steinwandt, R.2
-
9
-
-
84947423684
-
A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem
-
7th Australasian Conference of Information Security and Privacy - ACISP 2002, Springer-Verlag
-
J. Hughes, A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem. 7th Australasian Conference of Information Security and Privacy - ACISP 2002, Lecture Notes in Computer Science 2384, Springer-Verlag, pp. 176-189, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2384
, pp. 176-189
-
-
Hughes, J.1
-
11
-
-
84974622583
-
New Publickey Cryptosystem Using Braid Groups
-
Advances in Cryptology - Crypto 2000, Springer-Verlag
-
K.H. Ko, S.J. Lee, J.H. Cheon, J.W. Han, J.S. Kang, and C. Park, New Publickey Cryptosystem Using Braid Groups. Advances in Cryptology - Crypto 2000, Lecture Notes in Computer Science 1880, Springer-Verlag, pp. 166-183, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 166-183
-
-
Ko, K.H.1
Lee, S.J.2
Cheon, J.H.3
Han, J.W.4
Kang, J.S.5
Park, C.6
-
12
-
-
84880879949
-
Pseudorandomness from Braid Groups
-
Advances in Cryptology - CRYPTO 2001, Springer-Verlag
-
E. Lee, S.J. Lee, and S.G. Hahn, Pseudorandomness from Braid Groups. Advances in Cryptology - CRYPTO 2001, Lecture Notes in Computer Science 2139, Springer-Verlag, pp. 486-502, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 486-502
-
-
Lee, E.1
Lee, S.J.2
Hahn, S.G.3
-
13
-
-
56749171805
-
Potential Weaknesses of the Commutator Key Agreement Protocol based on Braid Groups
-
Advances in Cryptology - EUROCRYPT 2002, Springer-Verlag
-
S. J. Lee and E. Lee, Potential Weaknesses of the Commutator Key Agreement Protocol based on Braid Groups. Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science 2332, Springer-Verlag, pp. 14-28, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 14-28
-
-
Lee, S.J.1
Lee, E.2
-
14
-
-
84937406876
-
Analysis and Improvements of NTRU Encryption Paddings
-
Advances in Cryptology - CRYPTO 2002, Springer-Verlag
-
P.Q. Nguyen and D. Pointcheval, Analysis and Improvements of NTRU Encryption Paddings. Advances in Cryptology - CRYPTO 2002, Lecture Notes in Computer Science 2442, Springer-Verlag, pp. 210-215, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 210-215
-
-
Nguyen, P.Q.1
Pointcheval, D.2
-
15
-
-
84880894046
-
New Public Key Cryptosystem Using Finite Non Abelian Groups
-
Advances in Cryptology - CRYPTO 2001, Springer-Verlag
-
S.H. Paeng, K.C. Ha, J.H. Kim, S. Chee, and C. Park, New Public Key Cryptosystem Using Finite Non Abelian Groups. Advances in Cryptology - CRYPTO 2001, Lecture Notes in Computer Science 2139, Springer-Verlag, pp. 470-485, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 470-485
-
-
Paeng, S.H.1
Ha, K.C.2
Kim, J.H.3
Chee, S.4
Park, C.5
-
16
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
P.W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal of Computing 26, pp. 1484-1509, 1997.
-
(1997)
SIAM Journal of Computing
, vol.26
, pp. 1484-1509
-
-
Shor, P.W.1
-
17
-
-
2642561859
-
Quantum Computers: The End of Public-Key Cryptography?
-
January
-
V. Wheatman and L. McRory, Quantum Computers: The End of Public-Key Cryptography? Gartner research note, January 2002.
-
(2002)
Gartner Research Note
-
-
Wheatman, V.1
McRory, L.2
|