[1]Artin E. Theory of Braids[J]. Annals of Mathematics Studies, 1947, 48(2): 101-126. [2]Ko K H, Lee S J, Cheon J H, et al. New Public Key Cryptosystem Using Braid Groups[C]//Proceedings of CRYPTO’00. Berlin, Germany: Springer-Verlag, 2000: 166-183. [3]Sibert H, Dehornoy P, Girault M. Entity Authentication Schemes Using Braid Word Reduction[J]. Discrete Applied Mathematics, 2006, 154(2): 420-436. [4]Anshel I, Anshel M, Fisher B, et al. New Key Agreement Protocol in Braid Group Cryptography[C]//Proceedings of CRYPTO’01. Berlin, Germany: Springer-Verlag, 2001: 1-15. [5]Cha J C, Ko K H, Lee S J, et al. An Efficient Implementation of Braid Groups[C]//Proceedings of ASIACRYPT’01. Berlin, Germany: Springer-Verlag, 2001: 144-156. [6] 丁 勇, 田海博, 王育民. 一种改进的基于辫群的签名体制[J]. 西安电子科技大学学报, 2006, 33(1): 50-52. [7] 汤学明, 洪 帆, 崔国华. 辫子群上的公钥加密算法[J]. 软件学报, 2007, 18(3): 722-729. [8] 王励成. 基于辫群的密码方案的设计与分析[D]. 上海: 上海交通大学, 2007. [9] 朱 萍, 温巧燕. 基于辫子群的密码体制研究及进展[J]. 通信学报, 2009, 30(5): 105-113. [10] Myasnikov A, Ushakov A. Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key(AAGK) Exchange Protocol[C]//Proceedings of PKC’07. Berlin, Germany: Springer- Verlag, 2007: 76-88. [11] Kalka A G. Representation Attacks on the Braid Diffie-Hellman Public Key Encryption[J]. Applicable Algebra in Engineering, Communication and Computing, 2006, 17(3-4): 257-266. [12] Shpilrain V, Ushakov A. An Authentication Scheme Based on the Twisteded Conjugacy Problem[C]//Proceedings of the 6th International Conference on Applied Cryptography and Network Security. [S. l.]: Springer-Verlag, 2008: 366-372. [13] Ko K H, Lee S J, Cheon J H, et al. New Public-key Cryptosystem Using Braid Groups[C]//Proceedings of CRYPTO’00. [S. l.]: Springer, 2000. [14] Garside F A. The Braid Group and Other Groups[J]. Quarterly Journal of Mathematics, 1969, 20: 235-254. [15] Mihailova K A. The Occurence Problem for Direct Products of Groups[J]. Math. of the USSR Sbornik, 1966, 70: 241-251.
|