Papers
Topics
Authors
Recent
Search
2000 character limit reached

Cryptanalysis of Andrecut's public key cryptosystem

Published 6 Jul 2015 in math.GR | (1507.01496v1)

Abstract: We show that a linear decomposition attack based on the decomposition method introduced by the first author in monography "Algebraic cryptography" and in a series of papers works by finding the exchanging key in the Abdrecut's protocol.

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.