Ciarán Mullan

Follow

Generating author description...

Common Coauthors
Coauthor Papers Together
Carlos Cid 4
Simon R. Blackburn⋆ 4
Boaz Tsaban 4
Noam Lifshitz 1
Commonly Cited References
Action Title Year Authors # of times referenced
+ PDF Chat On Minimal Logarithmic Signatures of Finite Groups 2005 Wolfgang Lempken
Tran van Trung
3
+ Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol 2007 Alex D. Myasnikov
Alexander Ushakov
3
+ PDF Chat The cryptanalysis of a public-key implementation of finite group mappings 1995 Simon R. Blackburn⋆
Seán Murphy
Jacques Stern
3
+ PDF Chat On Minimal Factorisations of Sporadic Groups 2004 P.E. Holmes
3
+ Probabilistic solutions of equations in the braid group 2005 David Garber
S. Kaplan
Mina Teicher
Boaz Tsaban
Uzi Vishne
3
+ PDF Chat Collisions for the LPS Expander Graph Hash Function 2008 Jean–Pierre Tillich
Gilles Zémor
3
+ PDF Chat Conjugacy in Garside groups II: structure of the ultra summit set 2008 Joan S. Birman
Volker Gebhardt
Juan González-Meneses
3
+ A note on cyclic groups, finite fields, and the discrete logarithm problem 1992 Alfred Menezes
Scott A. Vanstone
3
+ A Reaction Attack on a Public Key Cryptosystem Based on the Word Problem 2004 Rainer Steinwandt
Mar�a Isabel Gonz�lez Vasco
3
+ PDF Chat A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem 2003 Jung Hee Cheon
Byungheup Jun
3
+ A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem 2002 James P. Hughes
3
+ PDF Chat A Public Key Cryptosystem Based on Non-abelian Finite Groups 2008 Wolfgang Lempken
Trung van Tran
Spyros S. Magliveras
Wandi Wei
3
+ Random subgroups and analysis of the length-based and quotient attacks 2008 Alexei Myasnikov
Alexander Ushakov
3
+ The Magma Algebra System I: The User Language 1997 Wieb Bosma
John Cannon
Catherine Playoust
3
+ PDF Chat New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups 2002 Magliveras
Stinson
Tran van Trung
3
+ Conjugacy in Garside groups III: Periodic braids 2007 Joan S. Birman
Volker Gebhardt
Juan González-Meneses
3
+ PDF Chat On Minimal Length Factorizations of Finite Groups 2003 María Isabel González Vasco
Martin Rötteler
Rainer Steinwandt
3
+ PDF Chat New Public-Key Cryptosystem Using Braid Groups 2000 Ki Hyoung Ko
Sangjin Lee
Jung Hee Cheon
Jae Woo Han
Ju-Sung Kang
Choon‐Sik Park
3
+ Length-Based Attacks for Certain Group Based Encryption Rewriting Systems 2003 James P. Hughes
Allen Tannenbaum
2
+ The One-Round Functions of the DES Generate the Alternating Group 2007 Ralph Wernsdorf
2
+ A Practical Attack on Some Braid Group Based Cryptographic Primitives 2002 Dennis Hofheinz
Rainer Steinwandt
2
+ PDF Chat Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups 2002 Sangjin Lee
Eon-Kyung Lee
2
+ PDF Chat An application of the O’Nan-Scott theorem to the group generated by the round functions of an AES-like cipher 2009 A. Caranti
Francesca Dalla Volta
Massimiliano Sala
2
+ Braid Group Cryptography 2007 David Garber
2
+ PDF Chat ON THE IMAGE OF THE LAWRENCE–KRAMMER REPRESENTATION 2005 Ryan Budney
2
+ PDF Chat Cryptographic Hash Functions from Expander Graphs 2007 Denis Charles
Kristin Lauter
Eyal Z. Goren
2
+ PDF Chat Cryptanalysing the critical group: efficiently solving Biggs's discrete logarithm problem 2009 Blackburn Simon R.
2
+ PDF Chat A weak cipher that generates the symmetric group 1994 Seán Murphy
Kenneth G. Paterson
Peter Wild
2
+ PDF Chat Algebraic properties of cryptosystem PGM 1992 Spyros S. Magliveras
Nasir Memon
2
+ A New Approach to the Word and Conjugacy Problems in the Braid Groups 1998 Joan S. Birman
Ki Hyoung Ko
Sangjin Lee
2
+ Theory of Braids 1947 Emil Artin
2
+ The theory of braids. 1950 Emil Artin
2
+ PDF Chat Length-based cryptanalysis: the case of Thompson's group 2007 Dima Ruinskiy
Adi Shamir
Boaz Tsaban
2
+ PDF Chat Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer 1997 Peter W. Shor
2
+ Group-based Cryptography 2008 Alexei Myasnikov
Vladimir Shpilrain
Alexander Ushakov
2
+ PDF Chat Expander graphs in pure and applied mathematics 2011 Alexander Lubotzky
1
+ Minimal logarithmic signatures for finite groups of Lie type 2010 Nidhi Singhi
Nikhil Singhi
Spyros S. Magliveras
1
+ PDF Chat Uniform expansion bounds for Cayley graphs of SL<sub>2</sub>(𝔽<sub>p</sub>) 2008 Jean Bourgain
Alex Gamburd
1
+ Minimal logarithmic signatures for classical groups 2010 Nikhil Singhi
Nidhi Singhi
1
+ PDF Chat The Round Functions of Cryptosystem PGM Generate the Symmetric Group 2005 A. Caranti
Francesca Dalla Volta
1
+ Group Factorizations and Information Theory 2007 Ulrich Tamm
1
+ PDF Chat Conjugacy in Garside groups I: cyclings, powers and rigidity 2007 Joan S. Birman
Volker Gebhardt
Juan González-Meneses
1
+ PDF Chat Cryptanalysis of the CFVZ cryptosystem 2007 Joan‐Josep Climent
Elisa Gorla
Joachim Rosenthal
1
+ PDF Chat Suzuki $2$-groups 1963 Graham Higman
1
+ Group theory in cryptography 2009 Simon R. Blackburn⋆
Carlos Cid
Ciarán Mullan
1
+ PDF Chat Cryptanalysis of a key exchange scheme based on block matrices 2013 María Isabel González Vasco
Ángel L. Pérez del Pozo
Pedro Taborda Duarte
Jorge L. Villar
1
+ Group Theoretic Cryptography 2015 María Isabel González Vasco
Rainer Steinwandt
1
+ The Discrete Logarithm Problem in GL(n, q). 1997 Alfred Menezes
Yihong Wu
1
+ Navigating in the Cayley graph of $$SL_2(\mathbb {F}_p)$$ S L 2 ( F p ) and applications to hashing 2015 Lisa Bromberg
Vladimir Shpilrain
Alina Vdovina
1
+ Key agreement, the Algebraic Eraser^{𝑇𝑀}, and lightweight cryptography 2006 Iris Anshel
Michael Anshel
Dorian Goldfeld
Stéphane Lemieux
1