-
1
-
-
0033245872
-
An algebraic method for public-key cryptography
-
Anshel I., Anshel M. and Goldfeld D. (1999). An algebraic method for public-key cryptography. Math. Res. Lett. 6: 287-291
-
(1999)
Math. Res. Lett.
, vol.6
, pp. 287-291
-
-
Anshel, I.1
Anshel, M.2
Goldfeld, D.3
-
2
-
-
0003316111
-
Braids, links and mapping class groups
-
Princeton University Press
-
Birman J.S.: Braids, links and mapping class groups, Annals of Math. Study 82, Princeton University Press (1974).
-
(1974)
Annals of Math. Study
, vol.82
-
-
Birman, J.S.1
-
3
-
-
35349012999
-
-
arXiv:math.GT/0605230
-
Birman J.S., Gebhardt V., González-Mensese J.: Conjugacy in Garside groups I: Cyclings, Powers, and Rigidity, arXiv:math.GT/0605230
-
Conjugacy in Garside Groups I: Cyclings, Powers, and Rigidity
-
-
Birman, J.S.1
Gebhardt, V.2
González-Mensese, J.3
-
4
-
-
0035684713
-
The infimum, supremum, and geodesic length of a braid conjugcy class
-
1
-
Birman J.S., Ko K.H. and Lee S.J. (2001). The infimum, supremum, and geodesic length of a braid conjugcy class. Adv. Math. 164(1): 41-56
-
(2001)
Adv. Math.
, vol.164
, pp. 41-56
-
-
Birman, J.S.1
Ko, K.H.2
Lee, S.J.3
-
5
-
-
84946826517
-
An efficient implementation of braid groups
-
Lecture Notes in Computer Science, Springer-Verlag Springer-verlag
-
Cha J.C., Ko K.H., Lee S.J., Han J.W., Cheon J.H.: An efficient implementation of braid groups. Advances in Cryptology: Proceedings of ASIACRYPT 2001, Lecture Notes in Computer Science, Springer-Verlag, vol 2248 pp. 144-156 Springer-verlag (2001).
-
(2001)
Advances in Cryptology: Proceedings of ASIACRYPT 2001
, vol.2248
, pp. 144-156
-
-
Cha, J.C.1
Ko, K.H.2
Lee, S.J.3
Han, J.W.4
Cheon, J.H.5
-
6
-
-
33746568769
-
A polynomial time algorithm for the braid Diffie-Hellman conjugacy problem
-
Advances in Cryptology: Proceedings of CRYPTO 2003 Springer-Verlag-2003
-
Cheon J.H., Jun B.: A polynomial time algorithm for the braid Diffie-Hellman conjugacy problem. Advances in Cryptology: Proceedings of CRYPTO 2003, Lecture Notes in Computer Science, vol 2729, pp. 212-225. Springer-Verlag-2003.
-
Lecture Notes in Computer Science
, vol.2729
, pp. 212-225
-
-
Cheon, J.H.1
Jun, B.2
-
7
-
-
33645959295
-
Braid-based cryptography
-
Dehornoy P. (2004). Braid-based cryptography. Contemp. Math. 360: 5-33
-
(2004)
Contemp. Math.
, vol.360
, pp. 5-33
-
-
Dehornoy, P.1
-
9
-
-
0041657285
-
Conjugacy problem for braid groups and Garside groups
-
1
-
Franco N. and Gonazález-Meneses J. (2003). Conjugacy problem for braid groups and Garside groups. J. Algebra 266(1): 112-132
-
(2003)
J. Algebra
, vol.266
, pp. 112-132
-
-
Franco, N.1
Gonazález-Meneses, J.2
-
11
-
-
0039349071
-
The braid group and other groups. Quart
-
2
-
Garside F.A. (1969). The braid group and other groups. Quart. J. Math. Oxford Ser. 20(2): 235-254
-
(1969)
J. Math. Oxford Ser.
, vol.20
, pp. 235-254
-
-
Garside, F.A.1
-
12
-
-
24644494679
-
A new approach to the conjugacy problem in Garside groups
-
to appear
-
Gebhardt V.: A new approach to the conjugacy problem in Garside groups, to appear in J. Algebra, (2005).
-
(2005)
J. Algebra
-
-
Gebhardt, V.1
-
13
-
-
33746365125
-
Conjugacy search in braid groups, from a braid-based cryptography point of view, applicable algebra in engineering
-
3-4
-
Gebhardt V. (2006). Conjugacy search in braid groups, from a braid-based cryptography point of view, applicable algebra in engineering. commun computi. 17(3-4): 219-238
-
(2006)
Commun Computi.
, vol.17
, pp. 219-238
-
-
Gebhardt, V.1
-
14
-
-
35248884293
-
A practical attack on some braid group based cryptographic primitives
-
6th International Workshop on Practice and Theory in Public Key Cryptography: Proceedings of PKC 2003 Springer Verlag
-
Hofheinz D., Steinwandt R.: A practical attack on some braid group based cryptographic primitives, 6th International Workshop on Practice and Theory in Public Key Cryptography: Proceedings of PKC 2003, Lecture Notes in Computer Science, vol 2567, pp. 187-198. Springer Verlag (2002).
-
(2002)
Lecture Notes in Computer Science
, vol.2567
, pp. 187-198
-
-
Hofheinz, D.1
Steinwandt, R.2
-
15
-
-
84947423684
-
A linear algebraic attack on the AAFG1 braid group cryptosystem
-
ACISP 2002 Springer-Verlag
-
Hughes J.: A linear algebraic attack on the AAFG1 braid group cryptosystem, ACISP 2002, Lecture Notes in Computer Science, vol 2384, pp. 176-189. Springer-Verlag (2002).
-
(2002)
Lecture Notes in Computer Science
, vol.2384
, pp. 176-189
-
-
Hughes, J.1
-
16
-
-
2642550575
-
Length-based attacks for certain group based encryption rewriting systems
-
Sécurité de la Communication sur Internet, Sept.
-
Hughes J., Tannenbaum A.: Length-based attacks for certain group based encryption rewriting systems, Workshop SECI02, Sécurité de la Communication sur Internet, Sept. 2002.
-
(2002)
Workshop SECI02
-
-
Hughes, J.1
Tannenbaum, A.2
-
18
-
-
35348954768
-
A fast algorithm to the conjugacy problem on generic braids
-
to appear in the March Osaka, Japan
-
Ko K.H., Lee J.W.: A fast algorithm to the conjugacy problem on generic braids, to appear in the proceedings of Knot theory for Scientific Objects, March, 2006, Osaka, Japan.
-
(2006)
Proceedings of Knot Theory for Scientific Objects
-
-
Ko, K.H.1
Lee, J.W.2
-
20
-
-
84974622583
-
New public-key cryptosystem using braid groups
-
Advances in Cryptology: Proceedings of CRYPTO 2000 Springer-Verlag
-
Ko K.H., Lee S.J., Cheon J.H., Han J.W., Kang J.S., Park C.S.: New public-key cryptosystem using braid groups. Advances in Cryptology: Proceedings of CRYPTO 2000. Lecture Notes in Computer Science, vol 1880, pp. 166-183. Springer-Verlag (2000).
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 166-183
-
-
Ko, K.H.1
Lee, S.J.2
Cheon, J.H.3
Han, J.W.4
Kang, J.S.5
Park, C.S.6
-
21
-
-
2642571847
-
Braid groups in cryptology. IEICE Trans
-
5
-
Lee E. (2004). Braid groups in cryptology. IEICE Trans. Fundamentals, E 87A(5): 986-992
-
(2004)
Fundamentals, e
, vol.87
, pp. 986-992
-
-
Lee, E.1
-
23
-
-
56749171805
-
Potential weakness of the commutator key agreement protocol based on braid groups
-
Proceedings of EUROCRYPT 2002 Springer-Verlag
-
Lee S.J., Lee E.K.: Potential weakness of the commutator key agreement protocol based on braid groups, Proceedings of EUROCRYPT 2002, Lecture Notes in Computer Science, vol 2332, pp. 14-28. Springer-Verlag (2002).
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 14-28
-
-
Lee, S.J.1
Lee, E.K.2
-
24
-
-
35248855465
-
Cryptanalysis of the public-key encryption based on braid groups
-
Advances in Cryptology: Proceedings of EUROCRYPT 2003 Springer-Verlag
-
Lee E., Park J.H.: Cryptanalysis of the public-key encryption based on braid groups, Advances in Cryptology: Proceedings of EUROCRYPT 2003, Lecture Notes in Computer Science, vol 2565, pp. 477-490. Springer-Verlag (2003).
-
(2003)
Lecture Notes in Computer Science
, vol.2565
, pp. 477-490
-
-
Lee, E.1
Park, J.H.2
-
25
-
-
33645985154
-
A weak key test for braid based cryptography
-
3
-
Maffre S. (2006). A weak key test for braid based cryptography. Designs Code. Cryptogr. 39(3): 347-373
-
(2006)
Des. Codes. Cryptogr.
, vol.39
, pp. 347-373
-
-
Maffre, S.1
-
26
-
-
84994864288
-
A practical heuristic attack on the Ko-Lee key exchange protocol
-
Advances in Cryptology: Proceedings of CRYPTO 2005 Springer-Verlag
-
Myasnikov A., Shpilrain V., Ushakov A.: A practical heuristic attack on the Ko-Lee key exchange protocol. Advances in Cryptology: Proceedings of CRYPTO 2005, Lecture Notes in Computer Science, vol 3621, pp. 86-96. Springer-Verlag (2005).
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 86-96
-
-
Myasnikov, A.1
Shpilrain, V.2
Ushakov, A.3
-
28
-
-
29244450840
-
Entity authentication schemes using braid word reduction
-
2
-
Sibert H., Dehornoy P. and Girault M. (2006). Entity authentication schemes using braid word reduction. Discrete Applied Math. 154(2): 420-436
-
(2006)
Discrete Applied Math.
, vol.154
, pp. 420-436
-
-
Sibert, H.1
Dehornoy, P.2
Girault, M.3
|