Bit Flipping Key Encapsulation for the Post-Quantum Era
It is a matter of time before quantum computers will break the cryptosystems like RSA and
ECC underpinning today's internet protocols. As Post-Quantum Cryptography (PQC) is a low …
ECC underpinning today's internet protocols. As Post-Quantum Cryptography (PQC) is a low …
On polynomial systems arising from a Weil descent
C Petit, JJ Quisquater - International Conference on the Theory and …, 2012 - Springer
In the last two decades, many computational problems arising in cryptography have been
successfully reduced to various systems of polynomial equations. In this paper, we revisit a …
successfully reduced to various systems of polynomial equations. In this paper, we revisit a …
Applications of Finite non-Abelian Simple Groups to Cryptography in the Quantum Era
MIG Vasco, D Kahrobaei, E McKemmie - La Matematica, 2024 - Springer
The theory of finite simple groups is a (rather unexplored) area likely to provide interesting
computational problems and modeling tools useful in a cryptographic context. In this note …
computational problems and modeling tools useful in a cryptographic context. In this note …
Matrix PRFs: constructions, attacks, and applications to obfuscation
We initiate a systematic study of pseudorandom functions (PRFs) that are computable by
simple matrix branching programs; we refer to these objects as “matrix PRFs”. Matrix PRFs …
simple matrix branching programs; we refer to these objects as “matrix PRFs”. Matrix PRFs …
[图书][B] Group Theoretic Cryptography
MIG Vasco, R Steinwandt - 2015 - books.google.com
Group theory appears to be a promising source of hard computational problems for
deploying new cryptographic constructions. This reference focuses on the specifics of using …
deploying new cryptographic constructions. This reference focuses on the specifics of using …
Navigating in the Cayley graph of and applications to hashing
L Bromberg, V Shpilrain, A Vdovina - Semigroup Forum, 2017 - Springer
Cayley hash functions are based on a simple idea of using a pair of (semi) group elements,
A and B, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the …
A and B, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the …
A Practical Cryptanalysis of WalnutDSA
D Hart, DH Kim, G Micheli, G Pascual-Perez… - … -Key Cryptography–PKC …, 2018 - Springer
We present a practical cryptanalysis of WalnutDSA, a digital signature algorithm
trademarked by SecureRF. WalnutDSA uses techniques from permutation groups, matrix …
trademarked by SecureRF. WalnutDSA uses techniques from permutation groups, matrix …
Left-Right Cayley Hashing: A New Framework for Provably Secure Hash Functions
Cayley hash function is a significant cryptographic primitive known to be provably secure
and expected to be universal due to the expansion property of Cayley graphs on finite …
and expected to be universal due to the expansion property of Cayley graphs on finite …
Cubical key generation and encryption algorithm based on hybrid cube's rotation
D Rajavel, SP Shantharajah - International Conference on …, 2012 - ieeexplore.ieee.org
We propose a new cryptographic algorithm based on combination of hybridization and
rotation of cubes. Hybridization was performed using magic cubes with m number of n order …
rotation of cubes. Hybridization was performed using magic cubes with m number of n order …
homomorphic hash functions: worst case to average case reduction and short collision search
C Mullan, B Tsaban - Designs, Codes and Cryptography, 2016 - Springer
We study homomorphic hash functions into SL _2 (q) SL 2 (q), the 2 * 2 2× 2 matrices with
determinant 1 over the field with q elements. Modulo a well supported number theoretic …
determinant 1 over the field with q elements. Modulo a well supported number theoretic …