Author:
Hong Haibo,Wang Licheng,Ahmad Haseeb,Shao Jun,Yang Yixian
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Algebra and Number Theory
Reference27 articles.
1. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)
2. Bohli, J.M., Steinwandt, R., Vasco, M.I.G., Martínez, C.: Weak keys in $$MST_1$$ M S T 1 . Des. Codes Cryptogr. 37, 509–524 (2005)
3. Lempken, W., Magliveras, S.S., van Trung, T., Wei, W.: A public key cryptosystem based on non-abelian finite groups. J. Cryptol. 22, 62–74 (2009)
4. Magliveras, S.S.: Secret and public-key cryptosystems from group factorizations. Tatra Mt. Math. Publ. 25, 11–22 (2002)
5. Magliveras, S.S., Memon, M.D.: Algebraic properties of cryptosystem PGM. J. Cryptol. 5, 167–183 (1992)