Length-based cryptanalysis: the case of Thompson's group
暂无分享,去创建一个
[1] Vladimir Shpilrain,et al. Thompson's Group and Public Key Cryptography , 2005, ACNS.
[2] Matthew G. Brin. The chameleon groups of Richard J. Thompson: Automorphisms and dynamics , 1995, math/9507205.
[3] Vladimir Shpilrain. Assessing security of some group based cryptosystems , 2003, IACR Cryptol. ePrint Arch..
[4] Adi Shamir,et al. Cryptanalysis of the Shpilrain-Ushakov Thompson group cryptosystem , 2005 .
[5] David Garber,et al. Probabilistic Solutions of Equations in the Braid Group , 2005, Adv. Appl. Math..
[6] D. Garber,et al. LENGTH-BASED CONJUGACY SEARCH IN THE BRAID GROUP , 2002, math/0209267.
[7] Allen R. Tannenbaum,et al. Length-Based Attacks for Certain Group Based Encryption Rewriting Systems , 2003, IACR Cryptol. ePrint Arch..
[8] D. Goldfeld,et al. An algebraic method for public-key cryptography , 1999 .
[9] Vladimir Shpilrain,et al. The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient , 2006, Applicable Algebra in Engineering, Communication and Computing.
[10] Francesco Matucci,et al. The Shpilrain-Ushakov Protocol for Thompson's Group $F$ is always breakable , 2006 .
[11] Francesco Matucci. Cryptanalysis of the Shpilrain–Ushakov Protocol for Thompson’s Group , 2007, Journal of Cryptology.
[12] Y Groner,et al. The Weizmann Institute of Science , 1962, Nature.