Bit Flipping Key Encapsulation for the Post-Quantum Era

MR Nosouhi, SWA Shah, L Pan, R Doss - IEEE Access, 2023 - ieeexplore.ieee.org
It is a matter of time before quantum computers will break the cryptosystems like RSA and
ECC underpinning today's internet protocols. As Post-Quantum Cryptography (PQC) is a low …

On polynomial systems arising from a Weil descent

C Petit, JJ Quisquater - International Conference on the Theory and …, 2012 - Springer
In the last two decades, many computational problems arising in cryptography have been
successfully reduced to various systems of polynomial equations. In this paper, we revisit a …

Applications of Finite non-Abelian Simple Groups to Cryptography in the Quantum Era

MIG Vasco, D Kahrobaei, E McKemmie - La Matematica, 2024 - Springer
The theory of finite simple groups is a (rather unexplored) area likely to provide interesting
computational problems and modeling tools useful in a cryptographic context. In this note …

Matrix PRFs: constructions, attacks, and applications to obfuscation

Y Chen, M Hhan, V Vaikuntanathan, H Wee - Theory of Cryptography …, 2019 - Springer
We initiate a systematic study of pseudorandom functions (PRFs) that are computable by
simple matrix branching programs; we refer to these objects as “matrix PRFs”. Matrix PRFs …

[图书][B] Group Theoretic Cryptography

MIG Vasco, R Steinwandt - 2015 - books.google.com
Group theory appears to be a promising source of hard computational problems for
deploying new cryptographic constructions. This reference focuses on the specifics of using …

Navigating in the Cayley graph of and applications to hashing

L Bromberg, V Shpilrain, A Vdovina - Semigroup Forum, 2017 - Springer
Cayley hash functions are based on a simple idea of using a pair of (semi) group elements,
A and B, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the …

A Practical Cryptanalysis of WalnutDSA

D Hart, DH Kim, G Micheli, G Pascual-Perez… - … -Key Cryptography–PKC …, 2018 - Springer
We present a practical cryptanalysis of WalnutDSA, a digital signature algorithm
trademarked by SecureRF. WalnutDSA uses techniques from permutation groups, matrix …

Left-Right Cayley Hashing: A New Framework for Provably Secure Hash Functions

Y Aikawa, H Jo, S Satake - Mathematical Cryptology, 2023 - journals.flvc.org
Cayley hash function is a significant cryptographic primitive known to be provably secure
and expected to be universal due to the expansion property of Cayley graphs on finite …

Cubical key generation and encryption algorithm based on hybrid cube's rotation

D Rajavel, SP Shantharajah - International Conference on …, 2012 - ieeexplore.ieee.org
We propose a new cryptographic algorithm based on combination of hybridization and
rotation of cubes. Hybridization was performed using magic cubes with m number of n order …

homomorphic hash functions: worst case to average case reduction and short collision search

C Mullan, B Tsaban - Designs, Codes and Cryptography, 2016 - Springer
We study homomorphic hash functions into SL _2 (q) SL 2 (q), the 2 * 2 2× 2 matrices with
determinant 1 over the field with q elements. Modulo a well supported number theoretic …