On a public-key cryptosystem based on iterated morphisms and substitutions
Theoretical Computer Science
A public-key cryptosystem based on language theory
Computers and Security
A cryptanalytic observation concerning systems based on language theory
Discrete Applied Mathematics
Observations concerning a public-key cryptosystem based on iterated morphisms
Theoretical Computer Science
Public-key cryptography
Hash functions and Cayley graphs
Designs, Codes and Cryptography
A course in computational algebraic number theory
A course in computational algebraic number theory
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
SIAM Journal on Computing
Public-Key Cryptosystems Using the Modular Group
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Loopholes in Two Public Key Cryptosystems Using the Modular Group
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Security Analysis of the MOR Cryptosystem
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Hi-index | 0.00 |
The main purpose of this paper is to examine applications of group theoretical concepts to cryptography. We construct a backward deterministic system employing the action of the modular group on the upper half plane and the amalgamated free product structure of the group. We invent a geometrical algorithm that finds the normal form of an element of the modular group effectively. This algorithm makes our backward deterministic system tractable. Using the backward deterministic system, we invent a public-key cryptosystem in terms of a functional cryptosystem.