Chapter PDF
Similar content being viewed by others
References
W. Bosma, J. Cannon, and C. Playoust, The Magma Algebra System I: The User Language, Journal of Symbolic Computation, 24 (1997), pp. 235–265.
R. Steinwandt, M. Grassl, W. Geiselmann, and T. Beth, Weaknesses in the SL2(F2n) Hashing Scheme, in Advances in Cryptology-CRYPTO 2000 Proceedings, M. Bellare, ed., vol. 1880 of Lecture Notes in Computer Science, Springer, 2000, pp. 287–299.
J.-P. Tillich and G. Zémor, Hashing with SL2, in Advances in Cryptology-CRYPTO’ 94, Y. Desmedt, ed., vol. 839 of Lecture Notes in Computer Science, 1994, pp. 40–49.
A. Yamamura, Public-Key Cryptosystems Using the Modular Group, in Public Key Cryptography; First International Workshop on Practice and Theory in Public Key Cryptography, PKC’ 98, H. Imai and Y. Zheng, eds., vol. 1431 of Lecture Notes in Computer Science, Berlin; Heidelberg, 1998, Springer, pp. 203–216.
5.—,A Functional Cryptosystem Using a Group Action, in Information Security and Privacy; 4th Australasian Conference, ACISP’99, J. Pieprzyk, R. Safavi-Naini, and J. Seberry, eds., vol. 1587 of Lecture Notes in Computer Science, Berlin; Heidelberg, 1999, Springer, pp. 314–325.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Steinwandt, R. (2001). Loopholes in Two Public Key Cryptosystems Using the Modular Group. In: Kim, K. (eds) Public Key Cryptography. PKC 2001. Lecture Notes in Computer Science, vol 1992. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44586-2_14
Download citation
DOI: https://doi.org/10.1007/3-540-44586-2_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41658-6
Online ISBN: 978-3-540-44586-9
eBook Packages: Springer Book Archive