Softcover ISBN: | 978-0-8218-4037-5 |
Product Code: | CONM/418 |
List Price: | $130.00 |
MAA Member Price: | $117.00 |
AMS Member Price: | $104.00 |
eBook ISBN: | 978-0-8218-8097-5 |
Product Code: | CONM/418.E |
List Price: | $125.00 |
MAA Member Price: | $112.50 |
AMS Member Price: | $100.00 |
Softcover ISBN: | 978-0-8218-4037-5 |
eBook: ISBN: | 978-0-8218-8097-5 |
Product Code: | CONM/418.B |
List Price: | $255.00 $192.50 |
MAA Member Price: | $229.50 $173.25 |
AMS Member Price: | $204.00 $154.00 |
Softcover ISBN: | 978-0-8218-4037-5 |
Product Code: | CONM/418 |
List Price: | $130.00 |
MAA Member Price: | $117.00 |
AMS Member Price: | $104.00 |
eBook ISBN: | 978-0-8218-8097-5 |
Product Code: | CONM/418.E |
List Price: | $125.00 |
MAA Member Price: | $112.50 |
AMS Member Price: | $100.00 |
Softcover ISBN: | 978-0-8218-4037-5 |
eBook ISBN: | 978-0-8218-8097-5 |
Product Code: | CONM/418.B |
List Price: | $255.00 $192.50 |
MAA Member Price: | $229.50 $173.25 |
AMS Member Price: | $204.00 $154.00 |
-
Book DetailsContemporary MathematicsVolume: 418; 2006; 178 ppMSC: Primary 94; 20; 68; 11; 57
The book consists of contributions related mostly to public-key cryptography, including the design of new cryptographic primitives as well as cryptanalysis of previously suggested schemes. Most papers are original research papers in the area that can be loosely defined as “non-commutative cryptography”; this means that groups (or other algebraic structures) which are used as platforms are non-commutative.
ReadershipGraduate students and research mathematicians interested in algebraic methods in cryptography.
-
Table of Contents
-
Articles
-
Iris Anshel, Michael Anshel, Dorian Goldfeld and Stephane Lemieux — Key agreement, the Algebraic Eraser$^{\rm TM}$, and lightweight cryptography [ MR 2389286 ]
-
G. Baumslag, T. Camps, B. Fine, G. Rosenberger and X. Xu — Designing key transport protocols using combinatorial group theory [ MR 2389287 ]
-
Arkady Berenstein and Leon Chernyak — Geometric key establishment [ MR 2389288 ]
-
Patrick Dehornoy — Using shifted conjugacy in braid-based cryptography [ MR 2389289 ]
-
David Garber, Shmuel Kaplan, Mina Teicher, Boaz Tsaban and Uzi Vishne — Length-based conjugacy search in the braid group [ MR 2389290 ]
-
María Isabel González Vasco, Rainer Steinwandt and Jorge L. Villar — Towards provable security for cryptographic constructions arising from combinatorial group theory [ MR 2389291 ]
-
Dima Grigoriev and Ilia Ponomarenko — Constructions in public-key cryptography over matrix groups [ MR 2389292 ]
-
Anja Groch, Dennis Hofheinz and Rainer Steinwandt — A practical attack on the root problem in braid groups [ MR 2389293 ]
-
Dennis Hofheinz and Dominique Unruh — An attack on a group-based cryptographic scheme [ MR 2389294 ]
-
Nils Gregor Leander — Algebraic problems in symmetric cryptography: two recent results on highly nonlinear functions [ MR 2389295 ]
-
Eonkyung Lee — Inverting the Burau and Lawrence-Krammer representations [ MR 2389296 ]
-
Vladimir Shpilrain and Alexander Ushakov — A new key exchange protocol based on the decomposition problem [ MR 2389297 ]
-
Vladimir Shpilrain and Gabriel Zapata — Using the subgroup membership search problem in public key cryptography [ MR 2389298 ]
-
-
Additional Material
-
RequestsReview Copy – for publishers of book reviewsPermission – for use of book, eBook, or Journal contentAccessibility – to request an alternate format of an AMS title
- Book Details
- Table of Contents
- Additional Material
- Requests
The book consists of contributions related mostly to public-key cryptography, including the design of new cryptographic primitives as well as cryptanalysis of previously suggested schemes. Most papers are original research papers in the area that can be loosely defined as “non-commutative cryptography”; this means that groups (or other algebraic structures) which are used as platforms are non-commutative.
Graduate students and research mathematicians interested in algebraic methods in cryptography.
-
Articles
-
Iris Anshel, Michael Anshel, Dorian Goldfeld and Stephane Lemieux — Key agreement, the Algebraic Eraser$^{\rm TM}$, and lightweight cryptography [ MR 2389286 ]
-
G. Baumslag, T. Camps, B. Fine, G. Rosenberger and X. Xu — Designing key transport protocols using combinatorial group theory [ MR 2389287 ]
-
Arkady Berenstein and Leon Chernyak — Geometric key establishment [ MR 2389288 ]
-
Patrick Dehornoy — Using shifted conjugacy in braid-based cryptography [ MR 2389289 ]
-
David Garber, Shmuel Kaplan, Mina Teicher, Boaz Tsaban and Uzi Vishne — Length-based conjugacy search in the braid group [ MR 2389290 ]
-
María Isabel González Vasco, Rainer Steinwandt and Jorge L. Villar — Towards provable security for cryptographic constructions arising from combinatorial group theory [ MR 2389291 ]
-
Dima Grigoriev and Ilia Ponomarenko — Constructions in public-key cryptography over matrix groups [ MR 2389292 ]
-
Anja Groch, Dennis Hofheinz and Rainer Steinwandt — A practical attack on the root problem in braid groups [ MR 2389293 ]
-
Dennis Hofheinz and Dominique Unruh — An attack on a group-based cryptographic scheme [ MR 2389294 ]
-
Nils Gregor Leander — Algebraic problems in symmetric cryptography: two recent results on highly nonlinear functions [ MR 2389295 ]
-
Eonkyung Lee — Inverting the Burau and Lawrence-Krammer representations [ MR 2389296 ]
-
Vladimir Shpilrain and Alexander Ushakov — A new key exchange protocol based on the decomposition problem [ MR 2389297 ]
-
Vladimir Shpilrain and Gabriel Zapata — Using the subgroup membership search problem in public key cryptography [ MR 2389298 ]