[图书][B] Non-commutative cryptography and complexity of group-theoretic problems

AG Myasnikov, V Shpilrain, A Ushakov - 2011 - books.google.com
Myasnikov (City College of New York) et al. apply the complexity of non-commutative groups
to public key cryptography, assess the generic-case performance of various algorithms, and …

[图书][B] Group-based cryptography

A Myasnikov, V Shpilrain, A Ushakov - 2008 - books.google.com
This book is about relations between three di? erent areas of mathematics and
theoreticalcomputer science: combinatorialgroup theory, cryptography, and c-plexity theory …

Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography

B Tsaban - Journal of Cryptology, 2015 - Springer
We introduce the linear centralizer method, and use it to devise a provable polynomial-time
solution of the Commutator Key Exchange Problem, the computational problem on which, in …

The conjugacy search problem in public key cryptography: unnecessary and insufficient

V Shpilrain, A Ushakov - Applicable Algebra in Engineering …, 2006 - Springer
The conjugacy search problem in a group G is the problem of recovering an x ∈ G from
given g ∈ G and h= x− 1 gx. This problem is in the core of several recently suggested public …

Cryptanalysis of Stickel's key exchange scheme

V Shpilrain - International computer science symposium in Russia, 2008 - Springer
We offer cryptanalysis of a key exchange scheme due to Stickel [11], which was inspired by
the well-known Diffie-Hellman protocol. We show that Stickel's choice of platform (the group …

A nonlinear decomposition attack

V Roman'kov - Groups Complexity Cryptology, 2016 - degruyter.com
This paper introduces a new type of attack, termed a nonlinear decomposition attack,
against two known group-based key agreement protocols, namely, protocol based on …

A new key exchange protocol based on the decomposition problem

V Shpilrain, A Ushakov - arXiv preprint math/0512140, 2005 - arxiv.org
In this paper we present a new key establishment protocol based on the decomposition
problem in non-commutative groups which is: given two elements $ w, w_1 $ of the platform …

A practical attack on a braid group based cryptographic protocol

A Myasnikov, V Shpilrain, A Ushakov - Advances in Cryptology–CRYPTO …, 2005 - Springer
In this paper we present a practical heuristic attack on the Ko, Lee et al. key exchange
protocol introduced at Crypto 2000 [11]. Using this attack, we were able to break the protocol …

Braid group cryptography

D Garber - Braids: Introductory lectures on braids, configurations …, 2010 - World Scientific
In the last decade, a number of public-key cryptosystems based on combinatorial group
theoretic problems in braid groups have been proposed. We survey these cryptosystems …

[图书][B] Complexity and Randomness in Group Theory: GAGTA BOOK 1

F Bassino, I Kapovich, M Lohrey, A Miasnikov… - 2020 - books.google.com
The goalofthisbookis toshowcasenewdirectionsingroup theorymotivated bycomputer
science. The subtitle (GAGTA book) reflects the fact that the book follows the courseoftheGeometricandAsymptoticGroup …