A lightweight authentication and authorization framework for blockchain-enabled IoT network in health-informatics

M Tahir, M Sardaraz, S Muhammad, M Saud Khan - Sustainability, 2020 - mdpi.com
Blockchain and IoT are being deployed at a large scale in various fields including
healthcare for applications such as secure storage, transactions, and process automation …

Lightweight mutual authentication for IoT and its applications

N Li, D Liu, S Nepal - IEEE Transactions on Sustainable …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) provides transparent and seamless incorporation of
heterogeneous and different end systems. It has been widely used in many applications …

[图书][B] Non-commutative cryptography and complexity of group-theoretic problems

AG Myasnikov, V Shpilrain, A Ushakov - 2011 - books.google.com
Myasnikov (City College of New York) et al. apply the complexity of non-commutative groups
to public key cryptography, assess the generic-case performance of various algorithms, and …

Towards practical key exchange from ordinary isogeny graphs

L De Feo, J Kieffer, B Smith - … 2018: 24th International Conference on the …, 2018 - Springer
We revisit the ordinary isogeny-graph based cryptosystems of Couveignes and Rostovtsev–
Stolbunov, long dismissed as impractical. We give algorithmic improvements that accelerate …

[图书][B] Group-based cryptography

A Myasnikov, V Shpilrain, A Ushakov - 2008 - books.google.com
This book is about relations between three di? erent areas of mathematics and
theoreticalcomputer science: combinatorialgroup theory, cryptography, and c-plexity theory …

[图书][B] Foundations of Garside theory

P Dehornoy, F Digne, E Godelle, D Krammer, J Michel - 2015 - Citeseer
A natural, but slowly emerging program. In his PhD thesis prepared under the supervision of
Graham Higman and defended in 1965 [123], and in the article that followed [124], FA …

Braids: a survey

JS Birman, TE Brendle - Handbook of knot theory, 2005 - Elsevier
Publisher Summary Crossings are suggested as they are in a picture of a highway overpass
on a map. The identity braid has a canonical representation in which two strands never …

Full quantum equivalence of group action DLog and CDH, and more

H Montgomery, M Zhandry - Journal of Cryptology, 2024 - Springer
Cryptographic group actions are a relaxation of standard cryptographic groups that have
less structure. This lack of structure allows them to be plausibly quantum resistant despite …

Public key cryptography based on semigroup actions

G Maze, C Monico, J Rosenthal - arXiv preprint cs/0501017, 2005 - arxiv.org
A generalization of the original Diffie-Hellman key exchange in $(\Z/p\Z)^* $ found a new
depth when Miller and Koblitz suggested that such a protocol could be used with the group …

Thompson's group and public key cryptography

V Shpilrain, A Ushakov - … Third International Conference, ACNS 2005, New …, 2005 - Springer
Recently, several public key exchange protocols based on symbolic computation in non-
commutative (semi) groups were proposed as a more efficient alternative to well established …