WalnutDSA™: a group theoretic digital signature algorithm
暂无分享,去创建一个
[1] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[2] Boaz Tsaban,et al. A Practical Cryptanalysis of the Algebraic Eraser , 2016, CRYPTO.
[3] Derek Atkins,et al. A class of hash functions based on the algebraic eraser™ , 2016, Groups Complex. Cryptol..
[4] Volker Gebhardt. A New Approach to the Conjugacy Problem in Garside Groups , 2003 .
[5] Yupu Hu,et al. Signature scheme based on the root extraction problem over braid groups , 2009, IET Inf. Secur..
[6] Alexander A. Razborov,et al. The Set of Minimal Braids is co-NP-Complete , 1991, J. Algorithms.
[7] Alexander Russell,et al. Generic quantum Fourier transforms , 2004, SODA '04.
[8] Gilles Zémor,et al. Hash Functions And Graphs With Large Girths , 1991, EUROCRYPT.
[9] Boaz Tsaban,et al. Short expressions of permutations as products and cryptanalysis of the Algebraic Eraser , 2012, Adv. Appl. Math..
[10] Joan S. Birman,et al. A new approach to the word and conjugacy problems in the braid groups , 1997 .
[11] Delaram Kahrobaei,et al. Non-commutative digital signatures , 2012, Groups Complex. Cryptol..
[12] Derek Atkins,et al. Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM) Hash Function on an MSP430 Microcontroller , 2016, IACR Cryptol. ePrint Arch..
[13] Giacomo Micheli,et al. A Practical Cryptanalysis of WalnutDSA , 2017, IACR Cryptol. ePrint Arch..
[14] Joan S. Birman,et al. Braids, Links, and Mapping Class Groups. (AM-82) , 1975 .
[15] Patrick Dehornoy,et al. A Fast Method for Comparing Braids , 1997 .
[16] Derek Atkins,et al. Addressing the Algebraic Eraser Diffie-Hellman Over-the-Air Protocol , 2016, IACR Cryptol. ePrint Arch..
[17] Alexander Ushakov,et al. An attack on the Walnut digital signature algorithm , 2018, IACR Cryptol. ePrint Arch..
[18] Alfred Menezes,et al. Critical perspectives on provable security: Fifteen years of "another look" papers , 2019, Adv. Math. Commun..
[19] Christophe Petit,et al. Factoring Products of Braids via Garside Normal Form , 2019, Public Key Cryptography.
[20] Simon R. Blackburn,et al. Practical attacks against the Walnut digital signature scheme , 2018, IACR Cryptol. ePrint Arch..
[21] Matthew J. B. Robshaw,et al. On the Security of the Algebraic Eraser Tag Authentication Protocol , 2016, ACNS.
[22] C. Leininger,et al. Two-generator subgroups of the pure braid group , 2008, 0812.1783.