1 - 8 of 8 articles
Abstract. Key establishment protocols based on hardness assumptions, such as the discrete logarithm problem and the integer factorization problem, are vulnerable to quantum computer attacks, whereas the protocols based on other hardness assumptions, such as the conjugacy search problem and the...
Abstract. We consider the problem of constructing continuous cryptographic primitives. We present several candidates for continuous hard-to-invert functions. To formulate these candidates, we introduce constructions based on tropical and supertropical circuits.
Abstract. Direct products of finite groups are a simple method to construct new groups from old ones. A difficult problem by comparison is to prove a generic group is indecomposable, or locate a proper nontrivial direct factor. To solve this problem it is shown that in most circumstances has a...
Abstract. For every odd prime and every integer , there is a Heisenberg group of order that has pairwise nonisomorphic quotients of order . Yet, these quotients are virtually indistinguishable. They have isomorphic character tables, every conjugacy class of a non-central element has the same...
Abstract. In 2003 Cohn and Umans introduced a group-theoretic approach to fast matrix multiplication. This involves finding large subsets of a group satisfying the triple product property (TPP) as a means to bound the exponent of matrix multiplication. We present two new characterizations of the...
Abstract. We consider the multiple conjugacy search problem over a subclass of partially commutative groups and experimentally attack it with a genetic algorithm hybridised with a “length attack”. We detail symbolic computation of words over the groups, constructing functions which measure...
Abstract. We propose a class of authentication schemes that are literally zero-knowledge, as compared to what is formally defined as “zero-knowledge” in cryptographic literature. We call this “no-leak” authentication to distinguish from an established “zero-knowledge” concept. The “no-leak”...
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.