2022
DOI: 10.1007/978-3-031-10467-1_32
|View full text |Cite
|
Sign up to set email alerts
|

Key Exchange Protocol Based on the Matrix Power Function Defined Over "Equation missing"

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…This comes from an assumption that NP-complete problems are hard to crack even for quantum computers. Important to note is the fact that we used the same templates defined in [8]. Notably, DLP does not provide sufficient security against quantum cryptanalysis.…”
Section: Response Challengementioning
confidence: 99%
See 4 more Smart Citations
“…This comes from an assumption that NP-complete problems are hard to crack even for quantum computers. Important to note is the fact that we used the same templates defined in [8]. Notably, DLP does not provide sufficient security against quantum cryptanalysis.…”
Section: Response Challengementioning
confidence: 99%
“…In this paper, we continue our research in the non-commuting asymmetric cryptography field. Recently we demonstrated how two users can agree on a shared key by executing a key exchange protocol based on the MPF defined over a non-commuting platform group [8]. There we used highly non-linear matrix mapping, where the entries of the base matrix were chosen from a non-commuting modular group of size 16.…”
Section: Response Challengementioning
confidence: 99%
See 3 more Smart Citations