Defeating the Kalka--Teicher--Tsaban linear algebra attack on the Algebraic Eraser
The Algebraic Eraser (AE) is a public key protocol for sharing information over an insecure channel using commutative and noncommutative groups; a concrete realization is given by Colored Burau Key Agreement Protocol (CBKAP).
Goldfeld, Dorian, Gunnells, Paul E.
core
A new representation of S-boxes for algebraic differential cryptanalysis
Alena Bednáriková, Pavol Zajac
openalex +1 more source
ESTABLISHED WAYS TO ATTACK EVEN THE BEST ENCRYPTION ALGORITHM [PDF]
Which solution is the best – public key or private key encryption? This question cannot have a very rigorous, logical and definitive answer, so that the matter be forever settled :).
Alexandru Tabusca
core
Algebraic Cryptanalysis of Block Ciphers Using Groebner Bases [PDF]
Andrey Pyshkin
openalex +1 more source
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases [PDF]
Jean‐Charles Faugère, Antoine Joux
openalex +1 more source
Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES
Marek Bielik +3 more
openalex +1 more source
Cryptanalysis of two schemes of Baba et al. by linear algebra methods [PDF]
В. А. Романьков
openalex +1 more source
Fully Dynamic Advanced Encryption Standard
As the reliance on using electronic services increases, the use of a strong encryption algorithm becomes paramount. The AES is the most widely used cipher. However, AES uses static transformations that attackers might exploit to cryptanalyze AES. In this
Shiraz Naserelden +3 more
doaj +1 more source
Algebraic Cryptanalysis of Post-Quantum Schemes and Related Assumptions
Pierre Briaud
openalex +1 more source
Interactions Between Brauer Configuration Algebras and Classical Cryptanalysis to Analyze Bach's Canons [PDF]
Agustín Moreno Cañadas +4 more
openalex +1 more source

