33
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Public key cryptography based on Moufang loops

Pages 2411-2427 | Received 01 May 2020, Published online: 13 Jun 2021

References

  • W. L. Chee, S. M. Gagola III, A. Rajah, Classification of minimal nonassociative Moufang loops of order pq3, Internat. J. Algebra Comput. 23(8) (2013), 1895–1908.
  • O. Chein, Moufang loops of small order I, Trans. Amer. Math. Soc. 188(2) (1974), 31–51.
  • O. Chein, A. Rajah, Possible orders of nonassociative Moufang loops, Comment. Math. Univ. Carolin 41(2) (2000), 237–244.
  • J.-J. Climent, J. A. López-Ramos, Public key protocols over the ring Ep(m), Adv. Math. Commun. 10(4) (2016), 861–870.
  • W. Diffie, M. E. Hellman, New directions in cryptography, IEEE Trans. Inf. Theory IT-22(6) (1976), 644–654.
  • D. Gligoroski, S. Markovski, and S. J. Knapskog, Multivariatequadratic trapdoor functions based on multivariate quadratic quasigroups, Proceedings of the American Conference on Applied Mathematics (2008), 44–49.
  • T. G. Jaiyéolá, On two cryptographic identities in universal Osborn loops, J. Di&screte Math. Sci. Cryptogr. 16(2-3) (2013), 95–116.
  • K. H. Ko, S. J. Lee, J. H. Cheon, J. W. Han, J. S. Kang, C. Park, New public-key cryptosystem using braid groups, Advances in Cryptology–CRYPTO 2000, Lecture Notes in Computer Science 1880 (2000), 166–183.
  • A. Krapež, An application of quasigroups in cryptology, Math. Maced. 8 (2010), 47–52.
  • G. Maze, C. Monica, J. Rosenthal, Public key cryptography based on semigroup actions, Adv. Math. Commun. 1(4) (2007), 489–507.
  • A. Rajah, Moufang loops of odd order pq3, J. Algebra 235 (2001), 66–93.
  • R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21(2) (1978), 120–126.
  • V. Shpilrain, Assessing security of some group based cryptosystem, Contemp. Math. Amer. Math. Soc. 360 (2004), 167–177.
  • Y. Xu, A cryptography application of conjugate quasigroups, Proceedings of the International Conference on Web Information Systems and Mining (2010), 63–65.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.