Abstract
In this paper we modify the technique of cyclic permutations to work with the shifted conjugacy problem. We apply this technique to design a heuristic attack on the cryptographic authentication scheme based on shifted conjugacy of braids proposed by Dehornoy in [5] and report experimental results.
| Original language | English |
|---|---|
| Pages (from-to) | 275-286 |
| Number of pages | 12 |
| Journal | Groups, Complexity, Cryptology |
| Volume | 1 |
| Issue number | 2 |
| DOIs | |
| State | Published - Oct 2009 |
Fingerprint
Dive into the research topics of 'A practical attack on a certain braid group based shifted conjugacy authentication protocol'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver