Braids have been studied by mathematicians for more than one century. Because they are so practical as to be used for cryptography, many cryptographers have been interested in them. For the last five years, there have been proposed some cryptographic applications and cryptanalyses in the area of braids. We survey the main examples of these results.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Eonkyung LEE, "Braid Groups in Cryptology" in IEICE TRANSACTIONS on Fundamentals,
vol. E87-A, no. 5, pp. 986-992, May 2004, doi: .
Abstract: Braids have been studied by mathematicians for more than one century. Because they are so practical as to be used for cryptography, many cryptographers have been interested in them. For the last five years, there have been proposed some cryptographic applications and cryptanalyses in the area of braids. We survey the main examples of these results.
URL: https://globals.ieice.org/en_transactions/fundamentals/10.1587/e87-a_5_986/_p
Copy
@ARTICLE{e87-a_5_986,
author={Eonkyung LEE, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Braid Groups in Cryptology},
year={2004},
volume={E87-A},
number={5},
pages={986-992},
abstract={Braids have been studied by mathematicians for more than one century. Because they are so practical as to be used for cryptography, many cryptographers have been interested in them. For the last five years, there have been proposed some cryptographic applications and cryptanalyses in the area of braids. We survey the main examples of these results.},
keywords={},
doi={},
ISSN={},
month={May},}
Copy
TY - JOUR
TI - Braid Groups in Cryptology
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 986
EP - 992
AU - Eonkyung LEE
PY - 2004
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E87-A
IS - 5
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - May 2004
AB - Braids have been studied by mathematicians for more than one century. Because they are so practical as to be used for cryptography, many cryptographers have been interested in them. For the last five years, there have been proposed some cryptographic applications and cryptanalyses in the area of braids. We survey the main examples of these results.
ER -