Cited by 23
Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problems in Group Representation Level

ICTC 2011
Eun-Jun Yoon, Kee-Young Yoo
Conference:  (2011), p. 547
New Results on Algebraic Constructions of Extremal Graph Theory and Implementations of New Algorithms of Postquantum Cryptography
Vasyl Ustimenko, Tymoteusz Chojecki
Book:  Lecture Notes in Networks and Systems (Intelligent Computing) Volume 739 (2023), p. 1409
Method of Information Security Risk Analysis for Virtualized System
Justinas Janulevičius
Book:  (2016)
Post-quantum Cryptoschemes: New Finite Non-commutative Algebras for Defining Hidden Logarithm Problem
Hieu Minh Nguyen, Nikolay Andreevich Moldovyan, Alexandr Andreevich Moldovyan, Nam Hai Nguyen, Cong Manh Tran, Ngoc Han Phieu
Book:  Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Context-Aware Systems and Applications, and Nature of Computation and Communication) Volume 266 (2019), p. 183
On Non-commutative Cryptography with Cubical Multivariate Maps of Predictable Density
V. Ustimenko, M. Klisowski
Book:  Advances in Intelligent Systems and Computing (Intelligent Computing) Volume 998 (2019), p. 654
2013 International Conference on IT Convergence and Security (ICITCS)
Hongxin Ma, Yingjue Fang, Xiaofeng Wang
Conference:  (2013), p. 1
Post-quantum Digital-Signature Algorithms on Finite 6-Dimensional Non-commutative Algebras
Nikolay A. Moldovyan, Dmitriy N. Moldovyan, Alexander A. Moldovyan, Hieu Minh Nguyen, Le Hoang Tuan Trinh
Book:  Lecture Notes in Computer Science (Future Data and Security Engineering) Volume 12466 (2020), p. 325
A Secured Digital Signature Using Conjugacy and DLP on Non-commutative Group over Finite Field
L. Narendra Mohan, G.S.G.N. Anjaneyulu
Book:  Advances in Intelligent Systems and Computing (Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications) Volume 516 (2017), p. 457
A New Key Exchange Protocol Based on Infinite Non-Abelian Groups
Jing Zhang, Ya-Juan Yang, Yi-Peng Li, Xingsi Xue
Journal:  Security and Communication Networks Volume 2022 (2022), p. 1
A novel version of the hidden logarithm problem for post-quantum signature algorithms
Minh Hieu Nguyen, Canh Ngoc Hoang, A.A. Moldovyan, N.A. Moldovyan, Huy Quang Vu, Danh Kim Le Tran
Journal:  Theoretical Computer Science Volume 921 (2022), p. 36
Asymmetric Secret Key Transfer Scheme over an Open Channel in K-Deterministic Groups with the Conditions C (3) –T (6)
N. V. Bezverkhniy, M. V. Nikitina
Journal:  Mathematics and Mathematical Modeling Issue 6 (2019), p. 88
Authenticated commutator key agreement protocol
Alexander Ushakov
Journal:  Groups Complexity Cryptology Volume 8, Issue 2 (2016)
Enhanced Matrix Power Function for Cryptographic Primitive Construction
Eligijus Sakalauskas
Journal:  Symmetry Volume 10, Issue 2 (2018), p. 43
Finite Non-Commutative Associative Algebras as Carriers of Hidden Discrete Logarithm Problem
N.A. Moldovyan, A.A. Moldovyan
Journal:  Bulletin of the South Ural State University. Series "Mathematical Modelling, Programming and Computer Software" Volume 12, Issue 1 (2019), p. 66
Improved Asymmetric Cipher Based on Matrix Power Function with Provable Security
Eligijus Sakalauskas, Aleksejus Mihalkovich, Algimantas Venčkauskas
Journal:  Symmetry Volume 9, Issue 1 (2017), p. 9
On Eulerian semigroups of multivariate transformations and their cryptographic applications
Vasyl Ustimenko
Journal:  European Journal of Mathematics Volume 9, Issue 4 (2023)
On new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groups
Vasyl Ustimenko, Michał Klisowski
Journal:  Algebra and Discrete Mathematics Volume 35, Issue 2 (2023), p. 220
On the security of DLCSP over $$GL_n(\mathbb {F}_q[S_r])$$
Atul Pandey, Indivar Gupta, Dhiraj Kumar Singh
Journal:  Applicable Algebra in Engineering, Communication and Computing Volume 34, Issue 4 (2023), p. 619
One-way functions based on the discrete logarithm problem in the groups meeting conditions C(3)-T(6).
Nikolai Bezverhnii, Olga Chernisheva
Journal:  Science and Education of the Bauman MSTU Volume 14, Issue 10 (2014)
Provably secure zero knowledge undeniable signature scheme over non-abelian group
Neha Goel, Indivar Gupta, B K Dass
Journal:  Sādhanā Volume 48, Issue 4 (2023)
Security analysis of KAP based on enhanced MPF
Eligijus Sakalauskas, Aleksejus Mihalkovich, Arnas Uselis
Journal:  IET Information Security Volume 14, Issue 4 (2020), p. 410
Undeniable signature scheme based over group ring
Neha Goel, Indivar Gupta, M. K. Dubey, B. K. Dass
Journal:  Applicable Algebra in Engineering, Communication and Computing Volume 27, Issue 6 (2016), p. 523
К анализу некоторых систем открытого распределения ключей, основанных на неабелевых группах
Михаил Михайлович Глухов, Mikhail Mikhailovich Glukhov
Journal:  Математические вопросы криптографии Volume 1, Issue 4 (2010), p. 5