242
Views
0
CrossRef citations to date
0
Altmetric
Mathematics of Cryptography and Coding in the Quantum Era

Further potential applications of group theory in information security

, &
Pages 375-380 | Received 17 Aug 2020, Accepted 19 Apr 2021, Published online: 14 Jun 2021

References

  • G. Baumslag, Topics in Combinatorial Group Theory, Birkhäuser Verlag, Basel, 1993.
  • G. Baumslag, Y. Brjukhov, B. Fine, and D. Troeger, Challenge response password security using combinatorial group theory, Groups –Complexity–Cryptology 2 (2010), pp. 35–82.
  • G. Baumslag, B. Fine, M. Kreuzer, and G. Rosenberger, A Course in Mathematical Cryptography, De Gruyter Verlag, Berlin, 2015.
  • C.F.R.Z.C. Chum, B. Fine, G. Rosenberger, and X. Zhang, A proposed alternative to the Shamir secret sharing scheme, Contemp. Math. 582 (2012), pp. 47–51.
  • P. Dehornoy, Braid-based cryptography, Contemp. Math. 360 (2004), pp. 5–33.
  • B. Fine, M. Habbeb, D. Kahrobaei, and G. Rosenberger, Aspects of non-commutative algebraic cryptography, J. Algebra Number Th. 21(1) (2011), pp. 1–40.
  • B. Fine, A.I.S. Moldenhauer, and G. Rosenberger, A secret sharing scheme based on the closest vector theorem and a modification to a private key cryptosystem, Groups–Complexity–Cryptology 5 (2013), pp. 223–228.
  • M.I. Gonzalez Vasco and R. Steinwandt, Group-theoretic Cryptography, CRC Press, Boca Raton, 2015.
  • W. Magnus, A. Karrass, and D. Solitar, Combinatorial Group Theory. 2nd ed. Dover Publications, New York, 1976.
  • A.I.S. Moldenhauer, Cryptographic protocols based on inner product spaces and group theory with a focus on the use of Nielsen Transformations, Ph.D. Thesis, University of Hamburg, 2016.
  • A.G. Myasnikov, V. Shpilrain, and A. Ushakov, Group-based Cryptography, Birkhäuser Verlag, Basel, 2008.
  • A.G. Myasnikov, V. Shpilrain, and A. Ushakov, Non-commutative Cryptography and Complexity of Group-theoretic Problems, Amer. Math. Soc. Surveys and Monographs, Providence, 2011.
  • J.P. Serre, Trees, Springer-Verlag, Berlin, 1980.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.