Applications of Finite non-Abelian Simple Groups to Cryptography in the Quantum Era

MIG Vasco, D Kahrobaei, E McKemmie - La Matematica, 2024 - Springer
The theory of finite simple groups is a (rather unexplored) area likely to provide interesting
computational problems and modeling tools useful in a cryptographic context. In this note …

Cryptanalysis of the MST3 public key cryptosystem

SR Blackburn, C Cid, C Mullan - Journal of Mathematical Cryptology, 2009 - degruyter.com
Cryptanalysis of the MST 3 public key cryptosystem Page 1 cO de Gruyter 2009 J. Math. Crypt.
3 (2009), 321–338 DOI 10.1515 / JMC.2009.020 Cryptanalysis of the MST3 public key …

On minimal length factorizations of finite groups

MIG Vasco, M Rötteler, R Steinwandt - Experimental Mathematics, 2003 - Taylor & Francis
Logarithmic signaturesare a special type of group factorizations, introduced as basic
components of certain cryptographic keys. Thus, short logarithmic signatures are of special …

Minimal logarithmic signatures for finite groups of Lie type

N Singhi, N Singhi, S Magliveras - Designs, Codes and Cryptography, 2010 - Springer
A logarithmic signature (LS) for a finite group G is an ordered tuple α= A 1, A 2,..., A n of
subsets A i of G, such that every element g ∈ G can be expressed uniquely as a product g …

[BOOK][B] Some results in group-based cryptography

C Mullan - 2011 - Citeseer
Group-based cryptography is concerned with the role of nonabelian groups in cryptography.
Since its origins in the 1980s, there have been numerous cryptographic proposals based on …

Group theory in cryptography

SR Blackburn, C Cid, C Mullan - … of Group St Andrews 2009 in …, 2011 - books.google.com
This paper is a guide for the pure mathematician who would like to know more about
cryptography based on group theory. The paper gives a brief overview of the subject, and …

A Digital Signature Scheme Based on MST3 Cryptosystems

H Hong, J Li, L Wang, Y Yang… - Mathematical Problems in …, 2014 - Wiley Online Library
As special types of factorization of finite groups, logarithmic signature and cover have been
used as the main components of cryptographic keys for secret key cryptosystems such as …

A note on the security of MST 3

MIG Vasco, ALP del Pozo, PT Duarte - Designs, Codes and Cryptography, 2010 - Springer
In this paper, we study the recently proposed encryption scheme MST 3, focusing on a
concrete instantiation using Suzuki-2-groups. In a passive scenario, we argue that the one …

Uniform cyclic group factorizations of finite groups

K Kanai, K Miyamoto, K Nuida… - Communications in …, 2024 - Taylor & Francis
In this paper, we introduce a kind of decomposition of a finite group called a uniform group
factorization, as a generalization of exact factorizations of a finite group. A group G is said to …

[PDF][PDF] A study of non-abelian public key cryptography

TC Lin - Int. J. Netw. Secur, 2018 - ijns.jalaxy.com.tw
Nonabelian group-based public key cryptography is a relatively new and exciting research
field. Rapidly increasing computing power and the futurity quantum computers [52] that have …