ORPP logo
Image from Google Jackets

Algebraic Methods in Cryptography.

By: Contributor(s): Material type: TextTextSeries: Contemporary MathematicsPublisher: Providence : American Mathematical Society, 2006Copyright date: ©2005Edition: 1st edDescription: 1 online resource (190 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780821880975
Subject(s): Genre/Form: Additional physical formats: Print version:: Algebraic Methods in CryptographyDDC classification:
  • 652/.8
LOC classification:
  • QA150 -- .S64 2005eb
Online resources:
Contents:
Intro -- Contents -- Key agreement, the Algebraic Eraser™, and lightweight cryptography -- Designing Key Transport Protocols Using Combinatorial Group Theory -- Geometric Key Establishment -- 0. Introduction -- 1. Key establishment schemes based on commuting double actions -- 2. Geometric Key Establishment I -- 3. Geometric Key Establishment II -- 4. Appendix A. General Key Establishment Scheme and its rounded versions -- 5. Appendix B. Proof of results of Sections 2 and 3 -- References -- Using shifted conjugacy in braid-based cryptography -- Length-based conjugacy search in the braid group -- Towards Provable Security for Cryptographic Constructions Arising from Combinatorial Group Theory -- Constructions in public-key cryptography over matrix groups -- A Practical Attack on the Root Problem in Braid Groups -- An attack on a group-based cryptographic scheme -- Algebraic Problems in Symmetric Cryptography: Two Recent Results on Highly Nonlinear Functions -- Inverting the Burau and Lawrence-Krammer Representations -- A new key exchange protocol based on the decomposition problem -- Using the subgroup membership search problem in public key cryptography.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- Contents -- Key agreement, the Algebraic Eraser™, and lightweight cryptography -- Designing Key Transport Protocols Using Combinatorial Group Theory -- Geometric Key Establishment -- 0. Introduction -- 1. Key establishment schemes based on commuting double actions -- 2. Geometric Key Establishment I -- 3. Geometric Key Establishment II -- 4. Appendix A. General Key Establishment Scheme and its rounded versions -- 5. Appendix B. Proof of results of Sections 2 and 3 -- References -- Using shifted conjugacy in braid-based cryptography -- Length-based conjugacy search in the braid group -- Towards Provable Security for Cryptographic Constructions Arising from Combinatorial Group Theory -- Constructions in public-key cryptography over matrix groups -- A Practical Attack on the Root Problem in Braid Groups -- An attack on a group-based cryptographic scheme -- Algebraic Problems in Symmetric Cryptography: Two Recent Results on Highly Nonlinear Functions -- Inverting the Burau and Lawrence-Krammer Representations -- A new key exchange protocol based on the decomposition problem -- Using the subgroup membership search problem in public key cryptography.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.