2011
DOI: 10.1007/978-3-642-21518-6_1
|View full text |Cite
|
Sign up to set email alerts
|

New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
40
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(40 citation statements)
references
References 21 publications
0
40
0
Order By: Relevance
“…We also discuss a related work by L. Wang et al (see [22]) which proposes a non-commutative version of Diffie-Hellman type encryption protocol which uses conjugation in noncommutative monoids and demonstrate their inadequacy.…”
Section: )mentioning
confidence: 99%
See 4 more Smart Citations
“…We also discuss a related work by L. Wang et al (see [22]) which proposes a non-commutative version of Diffie-Hellman type encryption protocol which uses conjugation in noncommutative monoids and demonstrate their inadequacy.…”
Section: )mentioning
confidence: 99%
“…Both papers, [5] and [22], use almost the same set of parameters. They use the semigroup G of 3×3 matrices of 1000-truncated polynomials in 10 variables over Z 11 (in [5]) and over Z 12 (in [22]). To be consistent with the notation above, we have n = 3, N = 1000, k = 10 and m = 11 or m = 12.…”
Section: )mentioning
confidence: 99%
See 3 more Smart Citations