Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2014 (2014), Article ID 630607, 10 pages
Research Article

Conjugacy Systems Based on Nonabelian Factorization Problems and Their Applications in Cryptography

Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China

Received 2 February 2014; Accepted 6 April 2014; Published 28 April 2014

Academic Editor: Javier Oliver

Copyright © 2014 Lize Gu and Shihui Zheng. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [5 citations]

The following is the list of published articles that have cited the current article.

  • Matthew Tamayo, “Algebraic full homomorphic encryption and resisting Gröbner basis cryptanalysis,” ACM Communications in Computer Algebra, vol. 49, no. 2, pp. 63–63, 2015. View at Publisher · View at Google Scholar
  • Jianwei Jia, Jinhui Liu, and Huanguo Zhang, “Cryptanalysis of cryptosystems based on general linear group,” China Communications, vol. 13, no. 6, pp. 217–224, 2016. View at Publisher · View at Google Scholar
  • Huanguo Zhang, Houzhen Wang, Shaowu Mao, Jinhui Liu, Aiwan Fan, and Jianwei Jia, “Cryptanalysis of public key cryptosystems based on non-Abelian factorization problems,” Tsinghua Science and Technology, vol. 21, no. 3, pp. 344–351, 2016. View at Publisher · View at Google Scholar
  • Jinhui Liu, Huanguo Zhang, Jianwei Jia, Houzhen Wang, Shaowu Mao, and Wanqing Wu, “Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem,” Science China-Information Sciences, vol. 59, no. 5, 2016. View at Publisher · View at Google Scholar
  • Houzhen Wang, Huanguo Zhang, and Shaohua Tang, “Key recovery on several matrix public-key encryption schemes,” Iet Information Security, vol. 10, no. 3, pp. 152–155, 2016. View at Publisher · View at Google Scholar