loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Author: Christian Tobias

Affiliation: Justus Liebig University Giessen, Germany

Keyword(s): MOR cryptosystem, cryptanalysis, conjugacy problem

Abstract: This paper cryptanalyses the MOR cryptosystem [6] when the group GL(2, R) ×θ ZZ n proposed in [7] is used. We show generic attacks on the system that work with every ring R. For a concrete choice of R even stronger attacks may be possible.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 44.222.63.67

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Tobias, C. (2004). Security Analysis of MOR using GL(2, R) ×θ ZZ n. In Proceedings of the 2nd International Workshop on Security in Information Systems (ICEIS 2004) - WOSIS; ISBN 972-8865-07-4, SciTePress, pages 170-179. DOI: 10.5220/0002671201700179

@conference{wosis04,
author={Christian Tobias.},
title={Security Analysis of MOR using GL(2, R) ×θ ZZ n},
booktitle={Proceedings of the 2nd International Workshop on Security in Information Systems (ICEIS 2004) - WOSIS},
year={2004},
pages={170-179},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002671201700179},
isbn={972-8865-07-4},
}

TY - CONF

JO - Proceedings of the 2nd International Workshop on Security in Information Systems (ICEIS 2004) - WOSIS
TI - Security Analysis of MOR using GL(2, R) ×θ ZZ n
SN - 972-8865-07-4
AU - Tobias, C.
PY - 2004
SP - 170
EP - 179
DO - 10.5220/0002671201700179
PB - SciTePress