Groups St Andrews 2009 in Bath: Group theory in cryptography
暂无分享,去创建一个
Simon R. Blackburn | Carlos Cid | Ciaran Mullan | S. Blackburn | Carlos Cid | Ciaran Mullan | C. Cid
[1] Gilles Zémor. Hash functions and Cayley graphs , 1994, Des. Codes Cryptogr..
[2] Nigel P. Smart,et al. Cryptography: An Introduction , 2004 .
[3] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[4] Michael J. Wiener,et al. DES is not a Group , 1992, CRYPTO.
[5] E. Artin. The theory of braids. , 1950, American scientist.
[6] A. Shamir,et al. Cryptanalysis of the HFE Public Key Cryptosystem , 1999 .
[7] James Hughes,et al. A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem , 2002, ACISP.
[8] Martin Rötteler,et al. On Minimal Length Factorizations of Finite Groups , 2003, Exp. Math..
[9] Boaz Tsaban,et al. Cryptanalysis of the Algebraic Eraser and short expressions of permutations as products , 2008, ArXiv.
[10] M. I. Gonz. Secret-and Public-key Cryptosystems from Group Factorizations , .
[11] Tran van Trung,et al. On Minimal Logarithmic Signatures of Finite Groups , 2005, Exp. Math..
[12] Kenneth G. Paterson,et al. Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers , 1999, FSE.
[13] Jacques Patarin,et al. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.
[14] C. Mitchell. in Designs , Codes , and Cryptography , 2007 .
[15] David Garber,et al. Braid Group Cryptography , 2007, ArXiv.
[16] Phong Q. Nguyen. Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97 , 1999, CRYPTO.
[17] Kenneth G. Paterson,et al. A weak cipher that generates the symmetric group , 1994, Journal of Cryptology.
[18] Norman Biggs. The Critical Group from a Cryptographic Perspective , 2007 .
[19] Petra E. Holmes. On Minimal Factorisations of Sporadic Groups , 2004, Exp. Math..
[20] Stephen M. Matyas,et al. The data encryption standard , 1997, Inf. Secur. Tech. Rep..
[21] Rüdiger Sparr,et al. Group theoretic properties of Rijndael-like ciphers , 2008, Discret. Appl. Math..
[22] Ralph Wernsdorf,et al. Markov Ciphers and Alternating Groups , 1994, EUROCRYPT.
[23] Ronald L. Rivest,et al. Is the Data Encryption Standard a group? (Results of cycling experiments on DES) , 1988, Journal of Cryptology.
[24] Ludovic Perret,et al. Security analysis of word problem-based cryptosystems , 2010, Des. Codes Cryptogr..
[25] Ralph Wernsdorf,et al. The Round Functions of RIJNDAEL Generate the Alternating Group , 2002, FSE.
[26] Alfred Menezes,et al. Algebraic curves and cryptography , 2005, Finite Fields Their Appl..
[27] Markus Grassl,et al. Cryptanalysis of the Tillich–Zémor Hash Function , 2010, Journal of Cryptology.
[28] A. Myasnikov,et al. New Developments in Commutator Key Exchange , 2008 .
[29] Gilles Zémor,et al. Hashing with SL_2 , 1994, CRYPTO.
[30] Ludovic Perret,et al. On the Wagner-Magyarik Cryptosystem , 2005, WCC.
[31] Thomas Beth,et al. Weaknesses in the SL 2 (IF s 2 ) Hashing Scheme. , 2000, CRYPTO 2000.
[32] Vladimir Shpilrain. Cryptanalysis of Stickel's Key Exchange Scheme , 2008, CSR.
[33] L. Washington. Elliptic Curves: Number Theory and Cryptography , 2003 .
[34] Jung Hee Cheon,et al. New Public-Key Cryptosystem Using Braid Groups , 2000, CRYPTO.
[35] Gilles Zémor,et al. Collisions for the LPS Expander Graph Hash Function , 2008, EUROCRYPT.
[36] Jung Hee Cheon,et al. A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem , 2003, CRYPTO.
[37] Ralph Wernsdorf,et al. The One-Round Functions of the DES Generate the Alternating Group , 1992, EUROCRYPT.
[38] Douglas R. Stinson. Cryptography: Theory and Practice, Third Edition , 2005 .
[39] Spyros S. Magliveras,et al. Symmetric Block Ciphers Based on Group Bases , 2000, Selected Areas in Cryptography.
[40] Adi Shamir,et al. Length-based cryptanalysis: the case of Thompson's group , 2007, J. Math. Cryptol..
[41] David Garber,et al. Probabilistic Solutions of Equations in the Braid Group , 2005, Adv. Appl. Math..
[42] Rainer Steinwandt,et al. A Reaction Attack on a Public Key Cryptosystem Based on the Word Problem , 2003, Applicable Algebra in Engineering, Communication and Computing.
[43] Nasir D. Memon,et al. Algebraic properties of cryptosystem PGM , 1992, Journal of Cryptology.
[44] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[45] Sangjin Lee,et al. Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups , 2002, EUROCRYPT.
[46] N. Koblitz. The Uneasy Relationship Between Mathematics and Cryptography , 2007 .
[47] Dennis Hofheinz,et al. A Practical Attack on Some Braid Group Based Cryptographic Primitives , 2003, Public Key Cryptography.
[48] Simon R. Blackburn. Cryptanalysing the critical group: efficiently solving Biggs's discrete logarithm problem , 2009, J. Math. Cryptol..
[49] Jung Hee Cheon,et al. An Efficient Implementation of Braid Groups , 2001, ASIACRYPT.
[50] Alexander Ushakov,et al. Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol , 2007, Public Key Cryptography.
[51] Eberhard Stickel,et al. A New Method for Exchanging Secret Keys , 2005, Third International Conference on Information Technology and Applications (ICITA'05).
[52] Volker Gebhardt,et al. Conjugacy in Garside groups III: Periodic braids , 2006 .
[53] Jacques Stern,et al. The cryptanalysis of a public-key implementation of finite group mappings , 2004, Journal of Cryptology.
[54] Don Coppersmith,et al. The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..
[55] Massimiliano Sala,et al. An application of the O’Nan-Scott theorem to the group generated by the round functions of an AES-like cipher , 2009, Des. Codes Cryptogr..
[56] Volker Gebhardt,et al. Conjugacy in Garside groups II: structure of the ultra summit set , 2006 .
[57] Andrea Caranti,et al. The Round Functions of Cryptosystem PGM Generate the Symmetric Group , 2006, Des. Codes Cryptogr..
[58] Douglas R. Stinson,et al. New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups , 2001, Journal of Cryptology.
[59] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[60] Allen R. Tannenbaum,et al. Length-Based Attacks for Certain Group Based Encryption Rewriting Systems , 2003, IACR Cryptol. ePrint Arch..
[61] Andrei V. Kelarev,et al. Braid-based cryptography , 2005 .
[62] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[63] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[64] Alexei G. Myasnikov,et al. Random subgroups and analysis of the length-based and quotient attacks , 2007, J. Math. Cryptol..
[65] 今井 浩. 20世紀の名著名論:Peter Shor : Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 2004 .
[66] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[67] Oded Goldreich,et al. Public-Key Cryptosystems from Lattice Reduction Problems , 1996, CRYPTO.
[68] D. Goldfeld,et al. An algebraic method for public-key cryptography , 1999 .
[69] Dale K. Pace,et al. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1998 .
[70] F. A. Garside,et al. THE BRAID GROUP AND OTHER GROUPS , 1969 .
[71] Spyros S. Magliveras,et al. A Public Key Cryptosystem Based on Non-abelian Finite Groups , 2008, Journal of Cryptology.
[72] Joan S. Birman,et al. A new approach to the word and conjugacy problems in the braid groups , 1997 .
[73] ON THE IMAGE OF THE LAWRENCE–KRAMMER REPRESENTATION , 2002, math/0202246.
[74] Neal R. Wagner,et al. A Public Key Cryptosystem Based on the Word Problem , 1985, CRYPTO.
[75] D. Kahn. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1967 .
[76] Alfred Menezes,et al. A note on cyclic groups, finite fields, and the discrete logarithm problem , 2005, Applicable Algebra in Engineering, Communication and Computing.