[BOOK][B] Group-based cryptography
This book is about relations between three di? erent areas of mathematics and
theoreticalcomputer science: combinatorialgroup theory, cryptography, and c-plexity theory …
theoreticalcomputer science: combinatorialgroup theory, cryptography, and c-plexity theory …
Cryptanalysis via algebraic spans
A Ben-Zvi, A Kalka, B Tsaban - … in Cryptology–CRYPTO 2018: 38th Annual …, 2018 - Springer
We introduce a method for obtaining provable polynomial time solutions of problems in
nonabelian algebraic cryptography. This method is widely applicable, easier to apply, and …
nonabelian algebraic cryptography. This method is widely applicable, easier to apply, and …
An efficient public key cryptosystem based on dihedral group and quantum spin states
The enciphering schemes based on medium transformations by following the strict
guidelines are almost used everywhere. We have developed the structure to simulate the …
guidelines are almost used everywhere. We have developed the structure to simulate the …
[BOOK][B] Complexity and Randomness in Group Theory: GAGTA BOOK 1
The goalofthisbookis toshowcasenewdirectionsingroup theorymotivated bycomputer
science. The subtitle (GAGTA book) reflects the fact that the book follows the courseoftheGeometricandAsymptoticGroup …
science. The subtitle (GAGTA book) reflects the fact that the book follows the courseoftheGeometricandAsymptoticGroup …
Mathematical approaches transform cybersecurity from protoscience to science
The area of cybersecurity problems has reached the stage of becoming a science. This
raises questions about the connection between the mathematical theories used in …
raises questions about the connection between the mathematical theories used in …
A new secure encryption scheme based on group factorization problem
Y Cong, H Hong, J Shao, S Han, J Lin, S Zhao - IEEE Access, 2019 - ieeexplore.ieee.org
As special types of factorization of finite groups, logarithmic signatures and covers have
been used as the main components of cryptographic keys for secret key cryptosystems such …
been used as the main components of cryptographic keys for secret key cryptosystems such …
Group transformations and entangled-state quantum gates with directionally unbiased linear-optical multiports
The concept of directionally unbiased optical multiports is introduced, in which photons may
reflect back out the input direction. A linear-optical implementation is described, and the …
reflect back out the input direction. A linear-optical implementation is described, and the …
Group theory in cryptography
This paper is a guide for the pure mathematician who would like to know more about
cryptography based on group theory. The paper gives a brief overview of the subject, and …
cryptography based on group theory. The paper gives a brief overview of the subject, and …
Generalized learning problems and applications to non-commutative cryptography
We propose a generalization of the learning parity with noise (LPN) and learning with errors
(LWE) problems to an abstract class of group-theoretic learning problems that we term …
(LWE) problems to an abstract class of group-theoretic learning problems that we term …
Kayawood, a key agreement protocol
I Anshel, D Atkins, D Goldfeld… - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Public-key solutions based on number theory, including RSA, ECC, and Diffie-Hellman, are
subject to various quantum attacks, which makes such solutions less attractive long term …
subject to various quantum attacks, which makes such solutions less attractive long term …