2000 character limit reached
Cryptanalysis of Andrecut's public key cryptosystem
Published 6 Jul 2015 in math.GR | (1507.01496v1)
Abstract: We show that a linear decomposition attack based on the decomposition method introduced by the first author in monography "Algebraic cryptography" and in a series of papers works by finding the exchanging key in the Abdrecut's protocol.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.