WalnutDSA™: a group theoretic digital signature algorithm

[1]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[2]  Boaz Tsaban,et al.  A Practical Cryptanalysis of the Algebraic Eraser , 2016, CRYPTO.

[3]  Derek Atkins,et al.  A class of hash functions based on the algebraic eraser™ , 2016, Groups Complex. Cryptol..

[4]  Volker Gebhardt A New Approach to the Conjugacy Problem in Garside Groups , 2003 .

[5]  Yupu Hu,et al.  Signature scheme based on the root extraction problem over braid groups , 2009, IET Inf. Secur..

[6]  Alexander A. Razborov,et al.  The Set of Minimal Braids is co-NP-Complete , 1991, J. Algorithms.

[7]  Alexander Russell,et al.  Generic quantum Fourier transforms , 2004, SODA '04.

[8]  Gilles Zémor,et al.  Hash Functions And Graphs With Large Girths , 1991, EUROCRYPT.

[9]  Boaz Tsaban,et al.  Short expressions of permutations as products and cryptanalysis of the Algebraic Eraser , 2012, Adv. Appl. Math..

[10]  Joan S. Birman,et al.  A new approach to the word and conjugacy problems in the braid groups , 1997 .

[11]  Delaram Kahrobaei,et al.  Non-commutative digital signatures , 2012, Groups Complex. Cryptol..

[12]  Derek Atkins,et al.  Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM) Hash Function on an MSP430 Microcontroller , 2016, IACR Cryptol. ePrint Arch..

[13]  Giacomo Micheli,et al.  A Practical Cryptanalysis of WalnutDSA , 2017, IACR Cryptol. ePrint Arch..

[14]  Joan S. Birman,et al.  Braids, Links, and Mapping Class Groups. (AM-82) , 1975 .

[15]  Patrick Dehornoy,et al.  A Fast Method for Comparing Braids , 1997 .

[16]  Derek Atkins,et al.  Addressing the Algebraic Eraser Diffie-Hellman Over-the-Air Protocol , 2016, IACR Cryptol. ePrint Arch..

[17]  Alexander Ushakov,et al.  An attack on the Walnut digital signature algorithm , 2018, IACR Cryptol. ePrint Arch..

[18]  Alfred Menezes,et al.  Critical perspectives on provable security: Fifteen years of "another look" papers , 2019, Adv. Math. Commun..

[19]  Christophe Petit,et al.  Factoring Products of Braids via Garside Normal Form , 2019, Public Key Cryptography.

[20]  Simon R. Blackburn,et al.  Practical attacks against the Walnut digital signature scheme , 2018, IACR Cryptol. ePrint Arch..

[21]  Matthew J. B. Robshaw,et al.  On the Security of the Algebraic Eraser Tag Authentication Protocol , 2016, ACNS.

[22]  C. Leininger,et al.  Two-generator subgroups of the pure braid group , 2008, 0812.1783.