The MAGMA algebra system I: the user language
Journal of Symbolic Computation - Special issue on computational algebra and number theory: proceedings of the first MAGMA conference
A Functional Cryptosystem Using a Group Action
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Weaknesses in the SL2(IFs2) Hashing Scheme
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Public-Key Cryptosystems Using the Modular Group
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Hi-index | 0.00 |
We demonstrate that the public key cryptosystems using the modular group suggested in [4,5] are vulnerable to very simple ciphertextonly attacks. Consequently, in the present form both of these systems cannot be considered as sufficiently secure for cryptographic purposes.