2013 International Conference on IT Convergence and Security (ICITCS)
Hongxin Ma, Yingjue Fang, Xiaofeng Wang
A New Key Exchange Protocol Based on Infinite Non-Abelian Groups
Jing Zhang, Ya-Juan Yang, Yi-Peng Li, Xingsi Xue
Journal
Security and Communication Networks
Volume 2022
(2022),
p. 1
A Secured Digital Signature Using Conjugacy and DLP on Non-commutative Group over Finite Field
L. Narendra Mohan, G.S.G.N. Anjaneyulu
Book
Advances in Intelligent Systems and Computing (Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications)
Volume 516
(2017),
p. 457
A novel version of the hidden logarithm problem for post-quantum signature algorithms
Minh Hieu Nguyen, Canh Ngoc Hoang, A.A. Moldovyan, N.A. Moldovyan, Huy Quang Vu, Danh Kim Le Tran
Journal
Theoretical Computer Science
Volume 921
(2022),
p. 36
Asymmetric Secret Key Transfer Scheme over an Open Channel in K-Deterministic Groups with the Conditions C (3) –T (6)
N. V. Bezverkhniy, M. V. Nikitina
Journal
Mathematics and Mathematical Modeling
Issue 6
(2019),
p. 88
Authenticated commutator key agreement protocol
Journal
Groups Complexity Cryptology
Volume 8,
Issue 2
(2016)
Enhanced Matrix Power Function for Cryptographic Primitive Construction
Journal
Symmetry
Volume 10,
Issue 2
(2018),
p. 43
Finite Non-Commutative Associative Algebras as Carriers of Hidden Discrete Logarithm Problem
N.A. Moldovyan, A.A. Moldovyan
Journal
Bulletin of the South Ural State University. Series "Mathematical Modelling, Programming and Computer Software"
Volume 12,
Issue 1
(2019),
p. 66
Eun-Jun Yoon, Kee-Young Yoo
Conference
(2011),
p. 547
Improved Asymmetric Cipher Based on Matrix Power Function with Provable Security
Eligijus Sakalauskas, Aleksejus Mihalkovich, Algimantas Venčkauskas
Journal
Symmetry
Volume 9,
Issue 1
(2017),
p. 9
Method of Information Security Risk Analysis for Virtualized System
New Results on Algebraic Constructions of Extremal Graph Theory and Implementations of New Algorithms of Postquantum Cryptography
Vasyl Ustimenko, Tymoteusz Chojecki
Book
Lecture Notes in Networks and Systems (Intelligent Computing)
Volume 739
(2023),
p. 1409
On Eulerian semigroups of multivariate transformations and their cryptographic applications
Journal
European Journal of Mathematics
Volume 9,
Issue 4
(2023)
On Multivariate Algorithms of Digital Signatures on Secure El Gamal‐Type Mode
On Non-commutative Cryptography with Cubical Multivariate Maps of Predictable Density
V. Ustimenko, M. Klisowski
Book
Advances in Intelligent Systems and Computing (Intelligent Computing)
Volume 998
(2019),
p. 654
On new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groups
Vasyl Ustimenko, Michał Klisowski
Journal
Algebra and Discrete Mathematics
Volume 35,
Issue 2
(2023),
p. 220
On the Restoration of Historical Matsumoto-Imai Cryptosystem and Other Schemes in Terms of Noncommutative Cryptography
Book
Lecture Notes in Networks and Systems (Proceedings of the Future Technologies Conference (FTC) 2024, Volume 2)
Volume 1155
(2024),
p. 99
On the security of DLCSP over $$GL_n(\mathbb {F}_q[S_r])$$
Atul Pandey, Indivar Gupta, Dhiraj Kumar Singh
Journal
Applicable Algebra in Engineering, Communication and Computing
Volume 34,
Issue 4
(2023),
p. 619
On the security of the STR key exchange protocol
Journal
AIMS Mathematics
Volume 10,
Issue 2
(2025),
p. 1967
One-way functions based on the discrete logarithm problem in the groups meeting conditions C(3)-T(6).
Nikolai Bezverhnii, Olga Chernisheva
Journal
Science and Education of the Bauman MSTU
Volume 14,
Issue 10
(2014)
Post-quantum Cryptoschemes: New Finite Non-commutative Algebras for Defining Hidden Logarithm Problem
Hieu Minh Nguyen, Nikolay Andreevich Moldovyan, Alexandr Andreevich Moldovyan, Nam Hai Nguyen, Cong Manh Tran, Ngoc Han Phieu
Book
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Context-Aware Systems and Applications, and Nature of Computation and Communication)
Volume 266
(2019),
p. 183
Post-quantum Digital-Signature Algorithms on Finite 6-Dimensional Non-commutative Algebras
Nikolay A. Moldovyan, Dmitriy N. Moldovyan, Alexander A. Moldovyan, Hieu Minh Nguyen, Le Hoang Tuan Trinh
Book
Lecture Notes in Computer Science (Future Data and Security Engineering)
Volume 12466
(2020),
p. 325
Provably secure zero knowledge undeniable signature scheme over non-abelian group
Neha Goel, Indivar Gupta, B K Dass
Journal
Sādhanā
Volume 48,
Issue 4
(2023)
Security analysis of KAP based on enhanced MPF
Eligijus Sakalauskas, Aleksejus Mihalkovich, Arnas Uselis
Journal
IET Information Security
Volume 14,
Issue 4
(2020),
p. 410
Undeniable signature scheme based over group ring
Neha Goel, Indivar Gupta, M. K. Dubey, B. K. Dass
Journal
Applicable Algebra in Engineering, Communication and Computing
Volume 27,
Issue 6
(2016),
p. 523
К анализу некоторых систем открытого распределения ключей, основанных на неабелевых группах
Михаил Михайлович Глухов, Mikhail Mikhailovich Glukhov
Journal
Математические вопросы криптографии
Volume 1,
Issue 4
(2010),
p. 5