30
Views
0
CrossRef citations to date
0
Altmetric
Research Article

On public key cryptosystem based on the word problem in a group

Pages 1563-1568 | Received 01 May 2019, Published online: 12 Oct 2020

References

  • B. Baumslag, B. Chandler, “Theory and Problems of Group Theory, Schaum’s outline series, (1968).
  • O. Bogopolski, Introduction to Group Theory”, European Mathematical Society, (2008).
  • W. Diffie, M. E. Hellman, “New Direction in Cryptography,” IEEE Trans, on Inform Theory, 22(6), P. 644-665, (1976). doi: 10.1109/TIT.1976.1055638
  • D. Guin et T. Hausberger, “Algèbre Tome 1 Groupes, Corps et Théorie de Galois”, EDP Sciences, (2008).
  • J. Hoffstein, J. Pipher, J. H. Silverman, “An Introduction to Mathematical Cryptography, Springer, (2014).
  • W. Ledermann, “Introduction to Group Theory, Longman, (1973).
  • C. Meshram andX. Li , “New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group”, Journal of Information and Optimization Sciences, Vol, 39, No.2, pp. 391-400, (2018). doi: 10.1080/02522667.2017.1411013
  • M. Mumtaz and L. Ping , “Forty years of attacks on the RSA cryptosystem”, Journal of Discrete Mathematical Sciences and Cryptography, Vol. 22, No.1, pp. 9-29, (2019). doi: 10.1080/09720529.2018.1564201
  • C. Paar, J. Pelzl, “Understanding Cryptography”, Springer, (2010).
  • L. Perret, “Etude d’Outils Algébriques et Combinatoires pour la Cryptographie à Clef Publique,” thèse de doctorat, Universite de Marne-la-Vallée, (2005).
  • H. Phan, P. Guillot, ”Preuves de Sécurité des Schémas Cryptographiques,” université Paris 8, (2013).
  • E. Post, “Recursive Unthenlvability of a Problem of Thue,”, Journal of Symbolic Logic, 12(1):1-11, (1947). doi: 10.2307/2267170
  • P. Sundarayya, G. Vara Prasad, “A public key cryptosystem using Affine Hill Cipher under modulation of prime number”, Journal of Information and Optimization Sciences, Vol. 40, No.4, pp. 919-930, (2019). doi: 10.1080/02522667.2018.1470751
  • S. Qiao, W. Han, Y. Li and L. Jiao, “Construction of Extended Multi-variante Public Key Cryptosystems,” International Journal of Network Security, Vol. 18, No.1, pp. 60-67, (2016).
  • N. R. Wagner, M. R. Magyarik. A Public Key Cryptosystem Based on the Word Problem. Proceedings of CRYPTO’84, LNCS 196, Springer-Verlag, pp. 19-36, (1985).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.