Cryptanalysis of the shpilrain-ushakov protocol for Thompson's group

4Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.

Abstract

This paper shows that an eavesdropper can always recover efficiently the private key of one of the two parts of the public key cryptography protocol introduced by Shpilrain and Ushakov (ACNS 2005, Lecture Notes in Comput. Sci., vol. 3531, pp. 151-163, 2005). Thus an eavesdropper can always recover the shared secret key, making the protocol insecure. © 2007 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Matucci, F. (2008). Cryptanalysis of the shpilrain-ushakov protocol for Thompson’s group. Journal of Cryptology, 21(3), 458–468. https://doi.org/10.1007/s00145-007-9016-4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free