Conjugacy in Rearrangement Groups of Fractals

M Tarocchi - arXiv preprint arXiv:2309.16613, 2023 - arxiv.org
We describe a method for solving the conjugacy problem in a vast class of rearrangement
groups of fractals, a family of Thompson-like groups introduced in 2019 by Belk and Forrest …

[PDF][PDF] Cryptographic protocols using semidirect products of finite groups

GHJ Lanel, T Jinasena, BAK Welihinda - 2021 - dr.lib.sjp.ac.lk
Non-abelian group based cryptosystems are a latest research inspiration, since they offer
better security due to their nonabelian properties. In this paper, we propose a novel …

Key Exchange Protocol Based on the Matrix Power Function Defined Over

A Mihalkovich, E Sakalauskas, M Levinskas - Science and Information …, 2022 - Springer
In this paper we propose a key exchange protocol (KEP) based on the so-called matrix
power function (MPF) defined over a non-commuting platform group. In general, it is not …

[PDF][PDF] Secure Image Encryption using E-Fractal-Based Non-Commutative Group and Hash Function

ON Kadhim, FH Najjar… - BIO Web of Conferences, 2024 - bio-conferences.org
Due to the importance of data security at present, an encryption algorithm based on the
principle of non-commutative group, hash function, and E-fractal has been proposed. Key …

Development of Algebraic Structures and Their Application to Ensure the Security of Digital Information

S Malik, S Agarwal, DAS Uniyal - Available at SSRN 4623318, 2023 - papers.ssrn.com
Today, data are a resource that is more important than ever for any organization we could
imagine of. Big data analysis, cloud technology, monitoring devices, as well as other …

Горизонти досліджень в груповій криптографії в контексті розробки постквантових криптосистем

Y Kotukh, G Khalimov, M Korobchynskyi, M Rudenko… - Radiotekhnika, 2024 - rt.nure.ua
Основним елементом криптографії з відкритим ключем є односторонні функції. У
криптографії така функція використовується для шифрування, тоді як її інверсія–для …

[PDF][PDF] Semidirect Products of Finite Groups in Public-Key Cryptographic Protocols

GHJ Lanel, TMKK Jinasena, BAK Welihinda - 2022 - dr.lib.sjp.ac.lk
Modern Cryptography, also known as Algebraic Cryptography has become a crucial and an
attractive field of research over the years. Public-key cryptosystems used at present, utilize …

Some analysis on conjugacy search problem for Diffie-Hellman protocol

SH Jusoo, MS Mohamad… - Data Analytics and …, 2022 - journal.ump.edu.my
The field in nonabelian group-based cryptosystem have gain attention of the researchers as
it expected to offers higher security when confronted with quantum computational due to …

[PDF][PDF] Потенціал Нерозвязаних Проблем у Груповій Криптографії

Є Котух, Г Халімов - Міжнародна науково–практична …, 2024 - journal.comp-sc.if.ua
Проблема слова стала одним з перших прикладів нерозв'язної задачі [2]. Через її
нерозв'язність декілька інших задач у комбінаторній теорії груп також виявилися …