2011
DOI: 10.1587/transfun.e94.a.853
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…The method we used is linearity similar to that in Refs. [6,9,14]. The attack only needs to solve computational SEME problem instead of SEME problem or discrete logarithm problem.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The method we used is linearity similar to that in Refs. [6,9,14]. The attack only needs to solve computational SEME problem instead of SEME problem or discrete logarithm problem.…”
Section: Discussionmentioning
confidence: 99%
“…[11] proposed by Pei and Zhao is based on TEME problem. Rasslan and Youssef [14] showed that breaking this scheme is equivalent to solving a set of linear equations which renders this scheme insecure.…”
Section: Introductionmentioning
confidence: 99%
“…(e.g., see [9,13]) due to the inherent linearity of the underlying matrices' operations. Designing a secure key exchange algorithm based on matrices or other non-commutative finite groups/rings with efficient operations remains a very interesting and challenging research problem.…”
Section: Discussionmentioning
confidence: 99%