Public key encryption algorithm on braid groups

被引:0
|
作者
Department of Information Security, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China [1 ]
机构
来源
Ruan Jian Xue Bao | 2007年 / 3卷 / 722-729期
关键词
Public key cryptography;
D O I
10.1360/jos180722
中图分类号
学科分类号
摘要
引用
收藏
页码:722 / 729
相关论文
共 50 条
  • [1] The improved Public Key Encryption Algorithm of Kerberos Protocol based on Braid Groups
    Jia, Ke
    Chen, Xiaojun
    Xu, Guanghua
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12551 - +
  • [2] Cryptanalysis of the public-key encryption based on braid groups
    Lee, E
    Park, JH
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 477 - 490
  • [3] Representation Attacks on the Braid Diffie-Hellman Public Key Encryption
    Arkadius G. Kalka
    Applicable Algebra in Engineering, Communication and Computing, 2006, 17 : 257 - 266
  • [4] Representation attacks on the Braid Diffie-Hellman public key encryption
    Kalka, Arkadius G.
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2006, 17 (3-4) : 257 - 266
  • [5] New public-key cryptosystem using braid groups
    Ko, KH
    Lee, SJ
    Cheon, JH
    Han, JW
    Kang, JS
    Park, C
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 166 - 183
  • [6] Broadcast Encryption Based on Braid Groups
    Saguansakdiyotin, Norranut
    Hiranvanichakorn, Pipat
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (02): : 12 - 19
  • [7] A polynomial algorithm for the braid double shielded public key cryptosystems
    Roman'kov, V. A.
    BULLETIN OF THE KARAGANDA UNIVERSITY-MATHEMATICS, 2016, 84 (04): : 110 - 115
  • [8] Dynamic Broadcast Encryption Based on Braid Groups
    Saguansakdiyotin, Norranut
    Hiranvanichakorn, Pipat
    2015 FIRST ASIAN CONFERENCE ON DEFENCE TECHNOLOGY (ACDT), 2015, : 119 - 126
  • [9] PROOF CHECKING THE RSA PUBLIC KEY ENCRYPTION ALGORITHM
    BOYER, RS
    MOORE, JS
    AMERICAN MATHEMATICAL MONTHLY, 1984, 91 (03): : 181 - 189
  • [10] Combining Public Key Encryption with Keyword Search and Public Key Encryption
    Zhang, Rui
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 888 - 896