-
1
-
-
21344480170
-
From the Post-Markov theorem through decision problems to public-key cryptography
-
I. Anshel and M. Anshel, From the Post-Markov theorem through decision problems to public-key cryptography, Amer. Math. Monthly 100 (1993), no. 9, 835-844.
-
(1993)
Amer. Math. Monthly
, vol.100
, Issue.9
, pp. 835-844
-
-
Anshel, I.1
Anshel, M.2
-
3
-
-
0000942205
-
Theory of braids
-
E. Artin, Theory of braids, Annals of Math. 48 (1947), 101-126.
-
(1947)
Annals of Math
, vol.48
, pp. 101-126
-
-
Artin, E.1
-
4
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangalore, India
-
C. H. Bennet and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, Proc. IEEE Int. Conf. Computers, Systems and Signal Processing (Bangalore, India, 1984), 175-179.
-
(1984)
Proc. IEEE Int. Conf. Computers, Systems and Signal Processing
, pp. 175-179
-
-
Bennet, C.H.1
Brassard, G.2
-
6
-
-
0001131295
-
A newappr oach to the word and conjugacy problems in the braid groups
-
J. S. Birman, K. H. Ko and S. J. Lee, A newappr oach to the word and conjugacy problems in the braid groups, Advances in Math. 139 (1998), 322-353.
-
(1998)
Advances in Math
, vol.139
, pp. 322-353
-
-
Birman, J.S.1
Ko, K.H.2
Lee, S.J.3
-
7
-
-
0000552770
-
Twenty years of attacks on the RSA cryptosystem
-
D. Boneh, Twenty years of attacks on the RSA cryptosystem, Notices Amer. Math. Soc. 46 (1999), 203-213.
-
(1999)
Notices Amer. Math. Soc
, vol.46
, pp. 203-213
-
-
Boneh, D.1
-
9
-
-
85034633063
-
Breaking iterated knapsacks, Advances
-
ed. G. R. Blakley and D. Chaum, Springer-Verlag
-
E. F. Brickell, Breaking iterated knapsacks, Advances in Cryptology, Proceedings of Crypto ’84, Lecture Notes in Computer Science 196, ed. G. R. Blakley and D. Chaum, Springer-Verlag (1985), 342-358.
-
(1985)
Cryptology, Proceedings of Crypto ’84, Lecture Notes in Computer Science
, vol.196
, pp. 342-358
-
-
Brickell, E.F.1
-
10
-
-
0000906878
-
A fast method for comparing braids
-
P. Dehornoy, A fast method for comparing braids, Advances in Math. 125 (1997), 200-235.
-
(1997)
Advances in Math
, vol.125
, pp. 200-235
-
-
Dehornoy, P.1
-
12
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory 31 (1985), 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
13
-
-
0000948525
-
Algorithms for positive braids
-
E. A. Elrifai and H. R. Morton, Algorithms for positive braids, Quart. J. Math. Oxford 45 (1994), no. 2, 479-497.
-
(1994)
Quart. J. Math. Oxford
, vol.45
, Issue.2
, pp. 479-497
-
-
Elrifai, E.A.1
Morton, H.R.2
-
14
-
-
84972496833
-
-
Jones & Bartlett
-
D. Epstein, J. Cannon, D. Holt, S. Levy, M. Paterson and W. Thurston, Word processing in groups, Jones & Bartlett, 1992.
-
(1992)
Word Processing in Groups
-
-
Epstein, D.1
Cannon, J.2
Holt, D.3
Levy, S.4
Paterson, M.5
Thurston, W.6
-
15
-
-
0003142575
-
Centralisers in the braid group and singular braid monoid
-
R. Fenn, D. Rolfsen and J. Zhu Centralisers in the braid group and singular braid monoid, Enseign. Math. (2) 42 (1996), no. 1-2, 75-96.
-
(1996)
Enseign. Math. (2)
, vol.42
, Issue.1-2
, pp. 75-96
-
-
Fenn, R.1
Rolfsen, D.2
Zhu, J.3
-
16
-
-
0039349071
-
The braid group and other groups
-
F. A. Garside, The braid group and other groups, Quart. J. Math. Oxford 20 (1969), no. 78, 235-254.
-
(1969)
Quart. J. Math. Oxford
, vol.20
, Issue.78
, pp. 235-254
-
-
Garside, F.A.1
-
17
-
-
0026223216
-
The complexity of Grigorchuk groups with application to cryptography
-
M. Garzon and Y. Zalcstein, The complexity of Grigorchuk groups with application to cryptography, Theoretical Computer Sciences 88 (1991) 83-98.
-
(1991)
Theoretical Computer Sciences
, vol.88
, pp. 83-98
-
-
Garzon, M.1
Zalcstein, Y.2
-
18
-
-
84958655849
-
Public-key cryptosystems from lattice reduction problems, Advances in Cryptology
-
ed. B. Kaliski, Springer-Verlag
-
O. Goldreich, S. Goldwasser and S. Halevi, Public-key cryptosystems from lattice reduction problems, Advances in Cryptology, Proceedings of Crypto ’97, Lecture Notes in Computer Science 1294, ed. B. Kaliski, Springer-Verlag (1997), 112-131.
-
(1997)
Proceedings of Crypto ’97, Lecture Notes in Computer Science
, vol.1294
, pp. 112-131
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
19
-
-
0002642275
-
Band-generator presentation for the 4-braid group
-
E. S. Kang, K. H. Ko and S. J. Lee, Band-generator presentation for the 4-braid group, Topology Appl. 78 (1997), 39-60.
-
(1997)
Topology Appl
, vol.78
, pp. 39-60
-
-
Kang, E.S.1
Ko, K.H.2
Lee, S.J.3
-
20
-
-
85029478766
-
Newpublic-key schemes bases on elliptic curves over the ring Zn
-
ed. J. Feigenbaum, Springer-Verlag
-
K. Komaya, U. Maurer, T. Okamoto and S. Vanston, Newpublic-key schemes bases on elliptic curves over the ring Zn, Advances in Cryptology, Proceedings of Crypto ’91, Lecture Notes in Computer Science 576, ed. J. Feigenbaum, Springer-Verlag (1992), 252-266
-
(1992)
Advances in Cryptology, Proceedings of Crypto ’91, Lecture Notes in Computer Science
, vol.576
, pp. 252-266
-
-
Komaya, K.1
Maurer, U.2
Okamoto, T.3
Vanston, S.4
-
22
-
-
0003496351
-
Knapsack public key cryptosystems and Diophantine approximation
-
ed. by D. Chaum, Plenum Publishing
-
J. C. Lagarias, Knapsack public key cryptosystems and Diophantine approximation, Advances in Cryptology: Proceedings of Crypto ’83, ed. by D. Chaum, Plenum Publishing (1984), 3-24.
-
(1984)
Advances in Cryptology: Proceedings of Crypto ’83
, pp. 3-24
-
-
Lagarias, J.C.1
-
23
-
-
0024139776
-
A key distribution system equivalent to factoring
-
K. McCurley, A key distribution system equivalent to factoring, Journal of Cryptology 1 (1988), 95-105.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 95-105
-
-
McCurley, K.1
-
25
-
-
0001430356
-
Mapping class groups are automatic
-
L. Mosher, Mapping class groups are automatic, Ann. Math. 142 (1995), 303-384.
-
(1995)
Ann. Math
, vol.142
, pp. 303-384
-
-
Mosher, L.1
-
27
-
-
0000813451
-
The set of minimal braids is co-NP-complete
-
M. S. Paterson and A. A. Rasborov, The set of minimal braids is co-NP-complete, J. Algorithms. 12 (1991), 393-408.
-
(1991)
J. Algorithms
, vol.12
, pp. 393-408
-
-
Paterson, M.S.1
Rasborov, A.A.2
-
28
-
-
0003614758
-
Digitized signatures and public-key functions as intractible as factorization
-
LCS/TR-212
-
M. O. Rabin, Digitized signatures and public-key functions as intractible as factorization, MIT Laboratory for Computer Science Technical Report, LCS/TR-212 (1979).
-
(1979)
MIT Laboratory for Computer Science Technical Report
-
-
Rabin, M.O.1
-
29
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM 21 (1978), 120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
30
-
-
0020910265
-
A polynomial time algorithm for breaking the basis Merkle-Hellman cryptosystem
-
ed. by D. Chaum et al., Plenum Publishing
-
A. Shamir, A polynomial time algorithm for breaking the basis Merkle-Hellman cryptosystem, Advances in Cryptology: Proceedings of Crypto ’82, ed. by D. Chaum et al., Plenum Publishing (1983), 279-288.
-
(1983)
Advances in Cryptology: Proceedings of Crypto ’82
, pp. 279-288
-
-
Shamir, A.1
-
32
-
-
0027720973
-
LUC: A newpublic key system
-
ed. E. Dougall, IFIP/Sec, North-Holland
-
P. Smith and M. Lennon, LUC: A newpublic key system, Proceedings of the IFIP TC11 Ninth International Conference on Information Security, ed. E. Dougall, IFIP/Sec 93, 103-117, North-Holland, 1993.
-
(1993)
Proceedings of the IFIP TC11 Ninth International Conference on Information Security
, vol.93
, pp. 103-117
-
-
Smith, P.1
Lennon, M.2
-
34
-
-
84958979582
-
On the security of Elgamal based encryption
-
Springer-Verlag
-
Y. Tsiounis and M. Yung, On the security of Elgamal based encryption, In PKC ’98, Lecture Notes in Computer Science 1431, Springer-Verlag (1998), 117-134.
-
(1998)
PKC ’98, Lecture Notes in Computer Science
, vol.1431
, pp. 117-134
-
-
Tsiounis, Y.1
Yung, M.2
-
35
-
-
84957701870
-
Cryptanalysis of the Chor-Rivest Cryptosystem
-
Krawczyk, Springer-Verlag
-
S. Vaudenay, Cryptanalysis of the Chor-Rivest Cryptosystem, Advances in Cryptology: Proceedings of Crypto ’98, Lecture Notes in Computer Science 1462, ed. Krawczyk, Springer-Verlag (1998), 243-256.
-
(1998)
Advances in Cryptology: Proceedings of Crypto ’98, Lecture Notes in Computer Science
, vol.1462
, pp. 243-256
-
-
Vaudenay, S.1
-
36
-
-
85034642277
-
Some public-key crypto-funtions as intractible as factorization
-
G. R. Blakley and D. Chaum, Springer-Verlag
-
H. Williams, Some public-key crypto-funtions as intractible as factorization, Advances in Cryptology, Proceedings of Crypto ’84, Lecture Notes in Computer Science 196, ed. G. R. Blakley and D. Chaum, Springer-Verlag (1985), 66-70.
-
(1985)
Advances in Cryptology, Proceedings of Crypto ’84, Lecture Notes in Computer Science
, vol.196
, pp. 66-70
-
-
Williams, H.1
-
37
-
-
85034665565
-
A public-key cryptosystem based on the word problem
-
ed. G. R. Blakley and D. Chaum, Springer-Verlag
-
N. R. Wagner and M. R. Magyarik, A public-key cryptosystem based on the word problem, Advances in Cryptology, Proceedings of Crypto ’84, Lecture Notes in Computer Science 196, ed. G. R. Blakley and D. Chaum, Springer-Verlag (1985), 19-36.
-
(1985)
Advances in Cryptology, Proceedings of Crypto ’84, Lecture Notes in Computer Science
, vol.196
, pp. 19-36
-
-
Wagner, N.R.1
Magyarik, M.R.2
|