搜索结果: 1-5 共查到“Algebraic eraser”相关记录5条 . 查询时间(0.046 秒)
Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM) Hash Function on an MSP430 Microcontroller
Algebraic eraser group theoretic cryptography braid groups
2016/12/7
Recently a novel family of braid based cryptographic hash function candidates was published,
claiming to be suitable for use in low resource environments. It was shown that the new hash
function fam...
Addressing the Algebraic Eraser Diffie--Hellman Over-the-Air Protocol
Algebraic Eraser Group Theoretic Cryptography E-Multiplication
2016/2/26
The Algebraic Eraser Diffie–Hellman (AEDH) protocol, first introduced in 2005 as a key
agreement and authentication protocol, has been proposed as a standard in ISO JTC-1/SC-31 (29167-
20) to protec...
On the Security of the Algebraic Eraser Tag Authentication Protocol
Algebraic Eraser cryptanalysis tag authentication
2016/2/23
The Algebraic Eraser has been gaining prominence as SecureRF,
the company commercializing the algorithm, increases its marketing
reach. The scheme is claimed to be well-suited to IoT applications bu...
Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser
Algebraic eraser colored Burau key agreement protocol group theoretic cryptography
2016/1/27
The \emph{Algebraic Eraser Diffie--Hellman} (AEDH) protocol was introduced in 2005 and published in 2006 by I.~Anshel, M.~Anshel, D.~Goldfeld, and S.~Lemieux as a protocol suitable for use on platform...
A Practical Cryptanalysis of the Algebraic Eraser
Cryptanalysis group-theoretic cryptography
2015/12/21
Anshel, Anshel, Goldfeld and Lemieaux introduced the Colored
Burau Key Agreement Protocol (CBKAP) as the concrete instantiation
of their Algebraic Eraser scheme. This scheme, based on techniques
fr...