𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Group-based cryptography

✍ Scribed by Alexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov


Publisher
BirkhΓ€user Verlag
Year
2008
Tongue
English
Leaves
191
Series
Advanced courses in mathematics, CRM Barcelona
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Group-based Cryptography (Advanced Cours
✍ Alexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov πŸ“‚ Library πŸ“… 2008 🌐 English

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in

Group-based Cryptography (Advanced Cours
✍ Alexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov πŸ“‚ Library πŸ“… 2008 🌐 English

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in

Group-based Cryptography (Advanced Cours
✍ Alexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov πŸ“‚ Library πŸ“… 2008 πŸ› BirkhΓ€user 🌐 English

<span>This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be u

Group Theoretic Cryptography
✍ Maria Isabel Vasco, Spyros Magliveras, Rainer Steinwandt πŸ“‚ Library πŸ“… 2015 πŸ› Chapman and Hall/CRC 🌐 English

<P>Group theoretic problems appear to be the most promising source of hard computational problems for deploying new cryptographic constructions. This reference focuses on the specifics of using nonabelian groups in the field of cryptography. It provides an introduction to cryptography (mostly asymme

Identity-Based Cryptography
✍ M. Joye, M. Joye, G. Neven πŸ“‚ Library πŸ“… 2009 πŸ› IOS Press 🌐 English

Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based