The Internet Archive has a preservation copy of this work in our general collections.
The file type is application/pdf
.
Filters
Cryptanalysis of Anshel-Anshel-Goldfeld-Lemieux key agreement protocol
[article]
2008
arXiv
pre-print
The Anshel-Anshel-Goldfeld-Lemieux (abbreviated AAGL) key agreement protocol is proposed to be used on low-cost platforms which constraint the use of computational resources. The core of the protocol is the concept of an Algebraic Eraser (abbreviated AE) which is claimed to be a suitable primitive for use within lightweight cryptography. The AE primitive is based on a new and ingenious idea of using an action of a semidirect product on a (semi)group to obscure involved algebraic structures. The
arXiv:0801.4786v1
fatcat:fmwkhha7vra7jb5xxnep37fv6y
more »
... underlying motivation for AAGL protocol is the need to secure networks which deploy Radio Frequency Identification (RFID) tags used for identification, authentication, tracing and point-of-sale applications. In this paper we revisit the computational problem on which AE relies and heuristically analyze its hardness. We show that for proposed parameter values it is impossible to instantiate the secure protocol. To be more precise, in 100% of randomly generated instances of the protocol we were able to find a secret conjugator z generated by TTP algorithm (part of AAGL protocol).
Cryptanalysis of matrix conjugation schemes
2014
Journal of Mathematical Cryptology
Abstract.In this paper we cryptanalyze two protocols: the Grigoriev–Shpilrain authentication protocol and a public key cryptosystem due to Wang, Wang, Cao, Okamoto and Shao. Both of these protocols use the computational hardness of some variations of the conjugacy search problem in a class of noncommutative monoids. We devise a practical heuristic algorithm solving those problems. As a conclusion we claim that these protocols are insecure for the proposed parameter values.
doi:10.1515/jmc-2012-0033
fatcat:twuihiimdreoncwfocyhnke4oa
Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux Key Agreement Protocol
2009
Groups - Complexity - Cryptology
Ushakov / Cryptanalysis of the Anshel-Anshel-... complexity of step A in Algorithms 2.2 and 2.4 is O(γn(|a i | + |b i |)). ...
doi:10.1515/gcc.2009.63
fatcat:etatnnqzmvhxzm7wtqkwvkqk3u
Structured models of scientific concepts for organizing, accessing, and using learning materials
2002
Proceedings of the second ACM/IEEE-CS joint conference on Digital libraries - JCDL '02
Vive la radiorésistance!: converging research in radiobiology and biogerontology to enhance human radioresistance for deep space exploration and colonization
2018
OncoTarget
Artemov, Alex Zhavoronkov, Alexey Moskalev, Evgeny Izumchenko, Dmitry Kaminskiy, Charles Cantor are associated with Insilico Medicine, Inc, an artificial intelligence company focused on drug discovery ...
doi:10.18632/oncotarget.24461
pmid:29581875
pmcid:PMC5865701
fatcat:ms66iixpvjazfiwz6kqubwbevq
Page 250 of Foreign Quarterly and Westminster Review Vol. 30, Issue 59
[page]
1842
Foreign Quarterly and Westminster Review
Thon, Constantine An- dreevitch 4
Tolstoi, Count Ushakov, Vassili
Ustrialov, Nikolai Gera- simov itch
Veltman, Alexander .
Moscow, 1792, July 12
1781
Viazemsky, Prince Petr. ...
Shakovsky, Prince Alex.|1777, April 24
Snegirev, Ivan Sushkov, Dimitrii . Tchernigov, the brothers. ...
Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol
[chapter]
Public Key Cryptography – PKC 2007
The length based attack on Anshel-Anshel-Goldfeld commutator key-exchange protocol [1] was initially proposed by Hughes and Tannenbaum in [9] . Several attempts have been made to implement the attack [6], but none of them had produced results convincing enough to believe that attack works. In this paper we show that accurately designed length based attack can successfully break a random instance of the simultaneous conjugacy search problem for certain parameter values and argue that the
doi:10.1007/978-3-540-71677-8_6
dblp:conf/pkc/MyasnikovU07
fatcat:uo6z55bxgfh27lnp5j7pjulnle
more »
... rivate information chosen uniformly random leads to weak keys.
Page 105 of None Vol. 34, Issue 1
[page]
1917
None
By Prince Alex. Koudashev.— Seven are recognized, of which A. ¢. taurica (p. 178) from Krym and A. c. persica (p. 179) from Northern Persia are new.
Turtur ferrago silvarum subsp. nova. (p. 181.) ...
Ushakov.
Ornithological Articles in Other Journals.'
Pearson, IT. G. Uncle Sam’s Birds. (Amer. Mus. Journ., XVI, No. 6, October, 1916).
Despott, G. Ornithological Report for the Maltese Islands. ...
Critical Letters to the Editors of the Soviet Press: Areas and Modes of Complaint
1952
American Sociological Review
Ushakov, Tolkovy Slovar Russkoge Yazyka, Moscow, 1940, IV, p. 37. ...
the items analyzed underscores the need for continuing inquiry and for the development of more precise instruments,
CRITICAL LETTERS TO THE EDITORS OF THE SOVIET PRESS: AREAS AND MODES OF COMPLAINT 7
ALEX ...
doi:10.2307/2088047
fatcat:tyh6d2qq3bae7mb6pyfaghj6ka
Page 694 of American Sociological Review Vol. 17, Issue 6
[page]
1952
American Sociological Review
Ushakov, Tolkovy Slovar Russkoge Yazyka, Moscow, 1940, IV, p. 37. ...
the items analyzed underscores the need for continuing inquiry and for the development of more precise instruments,
CRITICAL LETTERS TO THE EDITORS OF THE SOVIET PRESS: AREAS AND MODES OF COMPLAINT 7
ALEX ...
Preface
2020
Procedia Computer Science
Anastasia Romanova,
Denis Vaganov, Marat Valitov and Sergey Vasiliev
Dopamine and hippocampal synaptic plasticity . . . . . . . . . . . . . . . . . . . . . . . 650
Anna Proskura, Svetlana Vechkapova and Alex ...
Zaeva vi Activity of mirror neurons in man in the observation, pronunciation and mental pronunciation of words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Yury Bushov, Vadim Ushakov ...
doi:10.1016/j.procs.2020.02.241
fatcat:3xwcrqc22jbplitpazsdvmarbm
Page 1269 of Mathematical Reviews Vol. , Issue 84c
[page]
1984
Mathematical Reviews
Ursycsyn, Pawet Ushakov, A. I.
See Ushakov, I. A
...- 90052 . 65028
Ushakov, I. A. Usmani, R. A. Utegenov, K. 76070 Utkin, V. ...
Wainger, Stephen Waintal, Alex Walden, Rainer ... Waldinger, Richard Walker, Michael Wallner, R.P. ... Walters, R. F.C. ...
Page 4401 of Mathematical Reviews Vol. , Issue 86i
[page]
1986
Mathematical Reviews
Weiss, Alex Weiss, Asia Ivié Weiss, John Wells, R. O., Jr. Wen, Guo Chun
Wenocur, Michael L. . ...
See «81137
USan, Janez 06009
Ushakov, I. A.
Uspenskil, S. V.
Ustinov, N. A.
Utev, S. A.
Uusipaikka, Esa
Vainio, Reino Vainshtein, A. D. Vaisala, J.
VajterSic, Marian Valabrega, Paolo Valeev, V. G. ...
Page 4568 of Mathematical Reviews Vol. , Issue 2000f
[page]
2000
Mathematical Reviews
CMERE, BO 6 occinn sens 93019 Usha Devi, N. .... 05079 Ushakov, V. N . 60023 Ushakova, A. ...
Tretyakov, Alex Yu.
Treur, Jan
Tricot, Claude
Triebel, Hans ee MII. oicccvcovstsoss Triggiani, Roberto ............ Trigub, M. V. ...... Triméche, K. ...
Page 2543 of Mathematical Reviews Vol. , Issue 98D
[page]
1998
Mathematical Reviews
Ekkart Kindler and Rolf Walter, Arc-typed Petri nets (289-306); Werner Knaup, A new it- erative numerical solution algorithm for a class of stochastic Petri
68 COMPUTER SCIENCE
984:68010
nets (327-345); Alex ...
modelling the topology of homogeneous manifolds by means of symbolic computation (258- 273); Viorica Sofronie, Towards a sheaf semantics for cooperating agents scenarios (289-304); Vitaly Telerman and Dmitry Ushakov ...
« Previous
Showing results 1 — 15 out of 79 results