[BOOK][B] Group-based cryptography

A Myasnikov, V Shpilrain, A Ushakov - 2008 - books.google.com
This book is about relations between three di? erent areas of mathematics and
theoreticalcomputer science: combinatorialgroup theory, cryptography, and c-plexity theory …

Cryptanalysis via algebraic spans

A Ben-Zvi, A Kalka, B Tsaban - … in Cryptology–CRYPTO 2018: 38th Annual …, 2018 - Springer
We introduce a method for obtaining provable polynomial time solutions of problems in
nonabelian algebraic cryptography. This method is widely applicable, easier to apply, and …

An efficient public key cryptosystem based on dihedral group and quantum spin states

HM Waseem, A Alghafis, M Khan - IEEE Access, 2020 - ieeexplore.ieee.org
The enciphering schemes based on medium transformations by following the strict
guidelines are almost used everywhere. We have developed the structure to simulate the …

[BOOK][B] Complexity and Randomness in Group Theory: GAGTA BOOK 1

F Bassino, I Kapovich, M Lohrey, A Miasnikov… - 2020 - books.google.com
The goalofthisbookis toshowcasenewdirectionsingroup theorymotivated bycomputer
science. The subtitle (GAGTA book) reflects the fact that the book follows the courseoftheGeometricandAsymptoticGroup …

Mathematical approaches transform cybersecurity from protoscience to science

I Trenchev, W Dimitrov, G Dimitrov, T Ostrovska… - Applied Sciences, 2023 - mdpi.com
The area of cybersecurity problems has reached the stage of becoming a science. This
raises questions about the connection between the mathematical theories used in …

A new secure encryption scheme based on group factorization problem

Y Cong, H Hong, J Shao, S Han, J Lin, S Zhao - IEEE Access, 2019 - ieeexplore.ieee.org
As special types of factorization of finite groups, logarithmic signatures and covers have
been used as the main components of cryptographic keys for secret key cryptosystems such …

Group transformations and entangled-state quantum gates with directionally unbiased linear-optical multiports

DS Simon, CA Fitzpatrick, AV Sergienko - Physical Review A, 2016 - APS
The concept of directionally unbiased optical multiports is introduced, in which photons may
reflect back out the input direction. A linear-optical implementation is described, and the …

Group theory in cryptography

SR Blackburn, C Cid, C Mullan - … of Group St Andrews 2009 in …, 2011 - books.google.com
This paper is a guide for the pure mathematician who would like to know more about
cryptography based on group theory. The paper gives a brief overview of the subject, and …

Generalized learning problems and applications to non-commutative cryptography

G Baumslag, N Fazio, AR Nicolosi, V Shpilrain… - Provable Security: 5th …, 2011 - Springer
We propose a generalization of the learning parity with noise (LPN) and learning with errors
(LWE) problems to an abstract class of group-theoretic learning problems that we term …

Kayawood, a key agreement protocol

I Anshel, D Atkins, D Goldfeld… - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Public-key solutions based on number theory, including RSA, ECC, and Diffie-Hellman, are
subject to various quantum attacks, which makes such solutions less attractive long term …