Cited by 26
Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problems in Group Representation Level

2013 International Conference on IT Convergence and Security (ICITCS)
Hongxin Ma, Yingjue Fang, Xiaofeng Wang
Conference  (2013), p. 1
A New Key Exchange Protocol Based on Infinite Non-Abelian Groups
Jing Zhang, Ya-Juan Yang, Yi-Peng Li, Xingsi Xue
Journal  Security and Communication Networks Volume 2022 (2022), p. 1
A Secured Digital Signature Using Conjugacy and DLP on Non-commutative Group over Finite Field
L. Narendra Mohan, G.S.G.N. Anjaneyulu
Book  Advances in Intelligent Systems and Computing (Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications) Volume 516 (2017), p. 457
A novel version of the hidden logarithm problem for post-quantum signature algorithms
Minh Hieu Nguyen, Canh Ngoc Hoang, A.A. Moldovyan, N.A. Moldovyan, Huy Quang Vu, Danh Kim Le Tran
Journal  Theoretical Computer Science Volume 921 (2022), p. 36
Asymmetric Secret Key Transfer Scheme over an Open Channel in K-Deterministic Groups with the Conditions C (3) –T (6)
N. V. Bezverkhniy, M. V. Nikitina
Journal  Mathematics and Mathematical Modeling Issue 6 (2019), p. 88
Authenticated commutator key agreement protocol
Alexander Ushakov
Journal  Groups Complexity Cryptology Volume 8, Issue 2 (2016)
Enhanced Matrix Power Function for Cryptographic Primitive Construction
Eligijus Sakalauskas
Journal  Symmetry Volume 10, Issue 2 (2018), p. 43
Finite Non-Commutative Associative Algebras as Carriers of Hidden Discrete Logarithm Problem
N.A. Moldovyan, A.A. Moldovyan
Journal  Bulletin of the South Ural State University. Series "Mathematical Modelling, Programming and Computer Software" Volume 12, Issue 1 (2019), p. 66
ICTC 2011
Eun-Jun Yoon, Kee-Young Yoo
Conference  (2011), p. 547
Improved Asymmetric Cipher Based on Matrix Power Function with Provable Security
Eligijus Sakalauskas, Aleksejus Mihalkovich, Algimantas Venčkauskas
Journal  Symmetry Volume 9, Issue 1 (2017), p. 9
Method of Information Security Risk Analysis for Virtualized System
Justinas Janulevičius
Book  (2016)
New Results on Algebraic Constructions of Extremal Graph Theory and Implementations of New Algorithms of Postquantum Cryptography
Vasyl Ustimenko, Tymoteusz Chojecki
Book  Lecture Notes in Networks and Systems (Intelligent Computing) Volume 739 (2023), p. 1409
On Eulerian semigroups of multivariate transformations and their cryptographic applications
Vasyl Ustimenko
Journal  European Journal of Mathematics Volume 9, Issue 4 (2023)
On Multivariate Algorithms of Digital Signatures on Secure El Gamal‐Type Mode
Vasyl USTIMENKO
Book  (2024), p. 205
On Non-commutative Cryptography with Cubical Multivariate Maps of Predictable Density
V. Ustimenko, M. Klisowski
Book  Advances in Intelligent Systems and Computing (Intelligent Computing) Volume 998 (2019), p. 654
On new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groups
Vasyl Ustimenko, Michał Klisowski
Journal  Algebra and Discrete Mathematics Volume 35, Issue 2 (2023), p. 220
On the Restoration of Historical Matsumoto-Imai Cryptosystem and Other Schemes in Terms of Noncommutative Cryptography
Vasyl Ustimenko
Book  Lecture Notes in Networks and Systems (Proceedings of the Future Technologies Conference (FTC) 2024, Volume 2) Volume 1155 (2024), p. 99
On the security of DLCSP over $$GL_n(\mathbb {F}_q[S_r])$$
Atul Pandey, Indivar Gupta, Dhiraj Kumar Singh
Journal  Applicable Algebra in Engineering, Communication and Computing Volume 34, Issue 4 (2023), p. 619
On the security of the STR key exchange protocol
Aleksejus Mihalkovich
Journal  AIMS Mathematics Volume 10, Issue 2 (2025), p. 1967
One-way functions based on the discrete logarithm problem in the groups meeting conditions C(3)-T(6).
Nikolai Bezverhnii, Olga Chernisheva
Journal  Science and Education of the Bauman MSTU Volume 14, Issue 10 (2014)
Post-quantum Cryptoschemes: New Finite Non-commutative Algebras for Defining Hidden Logarithm Problem
Hieu Minh Nguyen, Nikolay Andreevich Moldovyan, Alexandr Andreevich Moldovyan, Nam Hai Nguyen, Cong Manh Tran, Ngoc Han Phieu
Book  Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Context-Aware Systems and Applications, and Nature of Computation and Communication) Volume 266 (2019), p. 183
Post-quantum Digital-Signature Algorithms on Finite 6-Dimensional Non-commutative Algebras
Nikolay A. Moldovyan, Dmitriy N. Moldovyan, Alexander A. Moldovyan, Hieu Minh Nguyen, Le Hoang Tuan Trinh
Book  Lecture Notes in Computer Science (Future Data and Security Engineering) Volume 12466 (2020), p. 325
Provably secure zero knowledge undeniable signature scheme over non-abelian group
Neha Goel, Indivar Gupta, B K Dass
Journal  Sādhanā Volume 48, Issue 4 (2023)
Security analysis of KAP based on enhanced MPF
Eligijus Sakalauskas, Aleksejus Mihalkovich, Arnas Uselis
Journal  IET Information Security Volume 14, Issue 4 (2020), p. 410
Undeniable signature scheme based over group ring
Neha Goel, Indivar Gupta, M. K. Dubey, B. K. Dass
Journal  Applicable Algebra in Engineering, Communication and Computing Volume 27, Issue 6 (2016), p. 523
К анализу некоторых систем открытого распределения ключей, основанных на неабелевых группах
Михаил Михайлович Глухов, Mikhail Mikhailovich Glukhov
Journal  Математические вопросы криптографии Volume 1, Issue 4 (2010), p. 5