A lightweight authentication and authorization framework for blockchain-enabled IoT network in health-informatics
Blockchain and IoT are being deployed at a large scale in various fields including
healthcare for applications such as secure storage, transactions, and process automation …
healthcare for applications such as secure storage, transactions, and process automation …
Lightweight mutual authentication for IoT and its applications
The Internet of Things (IoT) provides transparent and seamless incorporation of
heterogeneous and different end systems. It has been widely used in many applications …
heterogeneous and different end systems. It has been widely used in many applications …
[图书][B] Non-commutative cryptography and complexity of group-theoretic problems
Myasnikov (City College of New York) et al. apply the complexity of non-commutative groups
to public key cryptography, assess the generic-case performance of various algorithms, and …
to public key cryptography, assess the generic-case performance of various algorithms, and …
Towards practical key exchange from ordinary isogeny graphs
We revisit the ordinary isogeny-graph based cryptosystems of Couveignes and Rostovtsev–
Stolbunov, long dismissed as impractical. We give algorithmic improvements that accelerate …
Stolbunov, long dismissed as impractical. We give algorithmic improvements that accelerate …
[图书][B] Group-based cryptography
This book is about relations between three di? erent areas of mathematics and
theoreticalcomputer science: combinatorialgroup theory, cryptography, and c-plexity theory …
theoreticalcomputer science: combinatorialgroup theory, cryptography, and c-plexity theory …
[图书][B] Foundations of Garside theory
P Dehornoy, F Digne, E Godelle, D Krammer, J Michel - 2015 - Citeseer
A natural, but slowly emerging program. In his PhD thesis prepared under the supervision of
Graham Higman and defended in 1965 [123], and in the article that followed [124], FA …
Graham Higman and defended in 1965 [123], and in the article that followed [124], FA …
Braids: a survey
JS Birman, TE Brendle - Handbook of knot theory, 2005 - Elsevier
Publisher Summary Crossings are suggested as they are in a picture of a highway overpass
on a map. The identity braid has a canonical representation in which two strands never …
on a map. The identity braid has a canonical representation in which two strands never …
Full quantum equivalence of group action DLog and CDH, and more
H Montgomery, M Zhandry - Journal of Cryptology, 2024 - Springer
Cryptographic group actions are a relaxation of standard cryptographic groups that have
less structure. This lack of structure allows them to be plausibly quantum resistant despite …
less structure. This lack of structure allows them to be plausibly quantum resistant despite …
Public key cryptography based on semigroup actions
G Maze, C Monico, J Rosenthal - arXiv preprint cs/0501017, 2005 - arxiv.org
A generalization of the original Diffie-Hellman key exchange in $(\Z/p\Z)^* $ found a new
depth when Miller and Koblitz suggested that such a protocol could be used with the group …
depth when Miller and Koblitz suggested that such a protocol could be used with the group …
Thompson's group and public key cryptography
V Shpilrain, A Ushakov - … Third International Conference, ACNS 2005, New …, 2005 - Springer
Recently, several public key exchange protocols based on symbolic computation in non-
commutative (semi) groups were proposed as a more efficient alternative to well established …
commutative (semi) groups were proposed as a more efficient alternative to well established …