Algebraic Methods in Cryptography.
Material type:
- text
- computer
- online resource
- 9780821880975
- 652/.8
- QA150 -- .S64 2005eb
Intro -- Contents -- Key agreement, the Algebraic Eraser™, and lightweight cryptography -- Designing Key Transport Protocols Using Combinatorial Group Theory -- Geometric Key Establishment -- 0. Introduction -- 1. Key establishment schemes based on commuting double actions -- 2. Geometric Key Establishment I -- 3. Geometric Key Establishment II -- 4. Appendix A. General Key Establishment Scheme and its rounded versions -- 5. Appendix B. Proof of results of Sections 2 and 3 -- References -- Using shifted conjugacy in braid-based cryptography -- Length-based conjugacy search in the braid group -- Towards Provable Security for Cryptographic Constructions Arising from Combinatorial Group Theory -- Constructions in public-key cryptography over matrix groups -- A Practical Attack on the Root Problem in Braid Groups -- An attack on a group-based cryptographic scheme -- Algebraic Problems in Symmetric Cryptography: Two Recent Results on Highly Nonlinear Functions -- Inverting the Burau and Lawrence-Krammer Representations -- A new key exchange protocol based on the decomposition problem -- Using the subgroup membership search problem in public key cryptography.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.