Chapter PDF
Similar content being viewed by others
Keywords
References
I. Anshel, M. Anshel, D. Goldfeld, “An Algebraic Method for Public-Key Cryptography”, Mathematical Research Letters, 6 (1999), pp.287–291 176
S. Blackburn, S. Galbraith, “Cryptanalysis of two cryptosystems based on group action”, Advances in Cryptology-Asiacrypt 1999, LNCS 1716 176
K.H. Koo, S. J. Lee, J. H. Cheon, J. W. Han, J. Kang, C. Park, “New Public-Key Cryptosystem Using Braid Groups”, Advances in Cryptology-Crypto 2000, LNCS 1880, pp. 166–183 176
E. Lee, S. J. Lee, S.G. Hahn, “Pseudorandomness from Braid Groups”, Advances in Cryptology-Crypto 2001, LNCS 2139 176
Seong-Hun Paeng, Kil-Chan Ha, Jae Heon Kim, Seongtaek Chee, Choonsik Park, “New Public Key Cryptosystem Using Finite Non Abelian Groups”, Advances in Cryptology-Crypto 2001, LNCS 2139 175, 176, 177, 178, 179, 181, 184
Seong-Hun Paeng, Daesung Kwon, Kil-Chan Ha, Jae Heon Kim “Improved public key cryptosystem using finite non abelian groups”, IACR EPrint-Server, Report 2001/066, http://eprint.iacr.org/2001/066 175
A. Yamamura, “Public key cryptosystems using the modular group”, 1st International Public Key Cryptography Conference PKC 1998, LNCS 1431 176
A. Yamamura, “A functional cryptosystem using a group action”, 4th Australian Information Security and Privacy Conference ACISP 1999, LNCS 1587 176
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tobias, C. (2003). Security Analysis of the MOR Cryptosystem. In: Desmedt, Y.G. (eds) Public Key Cryptography — PKC 2003. PKC 2003. Lecture Notes in Computer Science, vol 2567. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36288-6_13
Download citation
DOI: https://doi.org/10.1007/3-540-36288-6_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00324-3
Online ISBN: 978-3-540-36288-3
eBook Packages: Springer Book Archive