2000 character limit reached
Linear decomposition attack on public key exchange protocols using semidirect products of (semi)groups
Published 6 Jan 2015 in cs.CR and math.GR | (1501.01152v1)
Abstract: We show that a linear decomposition attack based on the decomposition method introduced by the author works by finding the exchanged secret keys in all main protocols using semidirect products of (semi)grops proposed by Kahrobaei, Shpilrain, Habeeb, Koupparis and Lam.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.