Projects
Reading
People
Chat
SU\G
(𝔸)
/K·U
Projects
Reading
People
Chat
Sign Up
Sign In
Light
Dark
System
Ciarán Mullan
Follow
Share
Generating author description...
All published works
Action
Title
Year
Authors
+
PDF
Chat
$${\text {SL}}_2$$ SL 2 homomorphic hash functions: worst case to average case reduction and short collision search
2015
Ciarán Mullan
Boaz Tsaban
+
Short collision search in arbitrary SL2 homomorphic hash functions
2013
Ciarán Mullan
Boaz Tsaban
+
On Rystov's generalization of the Černý Conjecture
2013
Noam Lifshitz
Ciarán Mullan
Boaz Tsaban
+
Short collision search in arbitrary SL2 homomorphic hash functions.
2013
Ciarán Mullan
Boaz Tsaban
+
PDF
Chat
Cryptanalysis of three matrix-based key establishment protocols
2011
Simon R. Blackburn⋆
Carlos Cid
Ciarán Mullan
+
PDF
Chat
Group theory in cryptography
2011
Simon R. Blackburn⋆
Carlos Cid
Ciarán Mullan
+
Cryptanalysis of three matrix-based key establishment protocols
2011
Simon R. Blackburn⋆
Carlos Cid
Ciarán Mullan
+
PDF
Chat
Cryptanalysing variants of Stickel's key agreement scheme
2011
Ciarán Mullan
+
Some Results in Group-Based Cryptography
2011
Ciarán Mullan
+
Group theory in cryptography
2009
Simon R. Blackburn⋆
Carlos Cid
Ciarán Mullan
Common Coauthors
Coauthor
Papers Together
Carlos Cid
4
Simon R. Blackburn⋆
4
Boaz Tsaban
4
Noam Lifshitz
1
Commonly Cited References
Action
Title
Year
Authors
# of times referenced
+
PDF
Chat
On Minimal Logarithmic Signatures of Finite Groups
2005
Wolfgang Lempken
Tran van Trung
3
+
Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol
2007
Alex D. Myasnikov
Alexander Ushakov
3
+
PDF
Chat
The cryptanalysis of a public-key implementation of finite group mappings
1995
Simon R. Blackburn⋆
Seán Murphy
Jacques Stern
3
+
PDF
Chat
On Minimal Factorisations of Sporadic Groups
2004
P.E. Holmes
3
+
Probabilistic solutions of equations in the braid group
2005
David Garber
S. Kaplan
Mina Teicher
Boaz Tsaban
Uzi Vishne
3
+
PDF
Chat
Collisions for the LPS Expander Graph Hash Function
2008
Jean–Pierre Tillich
Gilles Zémor
3
+
PDF
Chat
Conjugacy in Garside groups II: structure of the ultra summit set
2008
Joan S. Birman
Volker Gebhardt
Juan González-Meneses
3
+
A note on cyclic groups, finite fields, and the discrete logarithm problem
1992
Alfred Menezes
Scott A. Vanstone
3
+
A Reaction Attack on a Public Key Cryptosystem Based on the Word Problem
2004
Rainer Steinwandt
Mar�a Isabel Gonz�lez Vasco
3
+
PDF
Chat
A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem
2003
Jung Hee Cheon
Byungheup Jun
3
+
A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem
2002
James P. Hughes
3
+
PDF
Chat
A Public Key Cryptosystem Based on Non-abelian Finite Groups
2008
Wolfgang Lempken
Trung van Tran
Spyros S. Magliveras
Wandi Wei
3
+
Random subgroups and analysis of the length-based and quotient attacks
2008
Alexei Myasnikov
Alexander Ushakov
3
+
The Magma Algebra System I: The User Language
1997
Wieb Bosma
John Cannon
Catherine Playoust
3
+
PDF
Chat
New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups
2002
Magliveras
Stinson
Tran van Trung
3
+
Conjugacy in Garside groups III: Periodic braids
2007
Joan S. Birman
Volker Gebhardt
Juan González-Meneses
3
+
PDF
Chat
On Minimal Length Factorizations of Finite Groups
2003
María Isabel González Vasco
Martin Rötteler
Rainer Steinwandt
3
+
PDF
Chat
New Public-Key Cryptosystem Using Braid Groups
2000
Ki Hyoung Ko
Sangjin Lee
Jung Hee Cheon
Jae Woo Han
Ju-Sung Kang
Choon‐Sik Park
3
+
Length-Based Attacks for Certain Group Based Encryption Rewriting Systems
2003
James P. Hughes
Allen Tannenbaum
2
+
The One-Round Functions of the DES Generate the Alternating Group
2007
Ralph Wernsdorf
2
+
A Practical Attack on Some Braid Group Based Cryptographic Primitives
2002
Dennis Hofheinz
Rainer Steinwandt
2
+
PDF
Chat
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups
2002
Sangjin Lee
Eon-Kyung Lee
2
+
PDF
Chat
An application of the O’Nan-Scott theorem to the group generated by the round functions of an AES-like cipher
2009
A. Caranti
Francesca Dalla Volta
Massimiliano Sala
2
+
Braid Group Cryptography
2007
David Garber
2
+
PDF
Chat
ON THE IMAGE OF THE LAWRENCE–KRAMMER REPRESENTATION
2005
Ryan Budney
2
+
PDF
Chat
Cryptographic Hash Functions from Expander Graphs
2007
Denis Charles
Kristin Lauter
Eyal Z. Goren
2
+
PDF
Chat
Cryptanalysing the critical group: efficiently solving Biggs's discrete logarithm problem
2009
Blackburn Simon R.
2
+
PDF
Chat
A weak cipher that generates the symmetric group
1994
Seán Murphy
Kenneth G. Paterson
Peter Wild
2
+
PDF
Chat
Algebraic properties of cryptosystem PGM
1992
Spyros S. Magliveras
Nasir Memon
2
+
A New Approach to the Word and Conjugacy Problems in the Braid Groups
1998
Joan S. Birman
Ki Hyoung Ko
Sangjin Lee
2
+
Theory of Braids
1947
Emil Artin
2
+
The theory of braids.
1950
Emil Artin
2
+
PDF
Chat
Length-based cryptanalysis: the case of Thompson's group
2007
Dima Ruinskiy
Adi Shamir
Boaz Tsaban
2
+
PDF
Chat
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
1997
Peter W. Shor
2
+
Group-based Cryptography
2008
Alexei Myasnikov
Vladimir Shpilrain
Alexander Ushakov
2
+
PDF
Chat
Expander graphs in pure and applied mathematics
2011
Alexander Lubotzky
1
+
Minimal logarithmic signatures for finite groups of Lie type
2010
Nidhi Singhi
Nikhil Singhi
Spyros S. Magliveras
1
+
PDF
Chat
Uniform expansion bounds for Cayley graphs of SL<sub>2</sub>(𝔽<sub>p</sub>)
2008
Jean Bourgain
Alex Gamburd
1
+
Minimal logarithmic signatures for classical groups
2010
Nikhil Singhi
Nidhi Singhi
1
+
PDF
Chat
The Round Functions of Cryptosystem PGM Generate the Symmetric Group
2005
A. Caranti
Francesca Dalla Volta
1
+
Group Factorizations and Information Theory
2007
Ulrich Tamm
1
+
PDF
Chat
Conjugacy in Garside groups I: cyclings, powers and rigidity
2007
Joan S. Birman
Volker Gebhardt
Juan González-Meneses
1
+
PDF
Chat
Cryptanalysis of the CFVZ cryptosystem
2007
Joan‐Josep Climent
Elisa Gorla
Joachim Rosenthal
1
+
PDF
Chat
Suzuki $2$-groups
1963
Graham Higman
1
+
Group theory in cryptography
2009
Simon R. Blackburn⋆
Carlos Cid
Ciarán Mullan
1
+
PDF
Chat
Cryptanalysis of a key exchange scheme based on block matrices
2013
María Isabel González Vasco
Ángel L. Pérez del Pozo
Pedro Taborda Duarte
Jorge L. Villar
1
+
Group Theoretic Cryptography
2015
María Isabel González Vasco
Rainer Steinwandt
1
+
The Discrete Logarithm Problem in GL(n, q).
1997
Alfred Menezes
Yihong Wu
1
+
Navigating in the Cayley graph of $$SL_2(\mathbb {F}_p)$$ S L 2 ( F p ) and applications to hashing
2015
Lisa Bromberg
Vladimir Shpilrain
Alina Vdovina
1
+
Key agreement, the Algebraic Eraser^{𝑇𝑀}, and lightweight cryptography
2006
Iris Anshel
Michael Anshel
Dorian Goldfeld
Stéphane Lemieux
1