Algebraic Methods in Cryptography.
Gerritzen, Lothar.
Algebraic Methods in Cryptography. - 1st ed. - 1 online resource (190 pages) - Contemporary Mathematics ; v.418 . - Contemporary Mathematics .
Intro -- Contents -- Key agreement, the Algebraic Eraserâ„¢, and lightweight cryptography -- Designing Key Transport Protocols Using Combinatorial Group Theory -- Geometric Key Establishment -- 0. Introduction -- 1. Key establishment schemes based on commuting double actions -- 2. Geometric Key Establishment I -- 3. Geometric Key Establishment II -- 4. Appendix A. General Key Establishment Scheme and its rounded versions -- 5. Appendix B. Proof of results of Sections 2 and 3 -- References -- Using shifted conjugacy in braid-based cryptography -- Length-based conjugacy search in the braid group -- Towards Provable Security for Cryptographic Constructions Arising from Combinatorial Group Theory -- Constructions in public-key cryptography over matrix groups -- A Practical Attack on the Root Problem in Braid Groups -- An attack on a group-based cryptographic scheme -- Algebraic Problems in Symmetric Cryptography: Two Recent Results on Highly Nonlinear Functions -- Inverting the Burau and Lawrence-Krammer Representations -- A new key exchange protocol based on the decomposition problem -- Using the subgroup membership search problem in public key cryptography.
9780821880975
Algebra -- Congresses.
Cryptography -- Congresses.
Electronic books.
QA150 -- .S64 2005eb
652/.8
Algebraic Methods in Cryptography. - 1st ed. - 1 online resource (190 pages) - Contemporary Mathematics ; v.418 . - Contemporary Mathematics .
Intro -- Contents -- Key agreement, the Algebraic Eraserâ„¢, and lightweight cryptography -- Designing Key Transport Protocols Using Combinatorial Group Theory -- Geometric Key Establishment -- 0. Introduction -- 1. Key establishment schemes based on commuting double actions -- 2. Geometric Key Establishment I -- 3. Geometric Key Establishment II -- 4. Appendix A. General Key Establishment Scheme and its rounded versions -- 5. Appendix B. Proof of results of Sections 2 and 3 -- References -- Using shifted conjugacy in braid-based cryptography -- Length-based conjugacy search in the braid group -- Towards Provable Security for Cryptographic Constructions Arising from Combinatorial Group Theory -- Constructions in public-key cryptography over matrix groups -- A Practical Attack on the Root Problem in Braid Groups -- An attack on a group-based cryptographic scheme -- Algebraic Problems in Symmetric Cryptography: Two Recent Results on Highly Nonlinear Functions -- Inverting the Burau and Lawrence-Krammer Representations -- A new key exchange protocol based on the decomposition problem -- Using the subgroup membership search problem in public key cryptography.
9780821880975
Algebra -- Congresses.
Cryptography -- Congresses.
Electronic books.
QA150 -- .S64 2005eb
652/.8