Further potential applications of group theory in information security
暂无分享,去创建一个
[1] A. Myasnikov,et al. Non-Commutative Cryptography and Complexity of Group-Theoretic Problems , 2011 .
[2] Gerhard Rosenberger,et al. A Course in Mathematical Cryptography , 2015 .
[3] Anja I. S. Moldenhauer,et al. Cryptographic protocols based on inner product spaces and group theory with a special focus on the use of Nielsen transformations , 2016 .
[4] Benjamin Fine,et al. Challenge response password security using combinatorial group theory , 2010, Groups Complex. Cryptol..
[5] Patrick Dehornoy. Braid-based cryptography , 2004 .
[6] Marston D. E. Conder,et al. An update on Hurwitz groups , 2010, Groups Complex. Cryptol..
[7] Rainer Steinwandt,et al. Group Theoretic Cryptography , 2015, Chapman and Hall / CRC cryptography and network security series.
[8] Mehmet,et al. On the Group Based Cryptography , 2014 .
[10] Nellie Clarke Brown. Trees , 1896, Savage Dreams.
[11] Gilbert Baumslag,et al. Topics in combinatorial group theory , 1993, Lectures in mathematics / ETH Zürich.
[12] Gerhard Rosenberger,et al. A secret sharing scheme based on the Closest Vector Theorem and a modification to a private key cryptosystem , 2013, Groups Complex. Cryptol..