all InfoSec news
An attack on a key exchange protocol based on max-times and min-times algebras
Nov. 28, 2022, 6:12 p.m. |
IACR News www.iacr.org
ePrint Report: An attack on a key exchange protocol based on max-times and min-times algebras
Matvei Kotov, Alexander Treier, Ivan Buchinskiy
In this paper, we examine one of the public key exchange protocols proposed in [M. I. Durcheva. An application of different dioids in public key cryptography. In AIP Conference Proceedings, vol. 1631, pp 336-343. AIP, 2014] which uses max-times and min-times algebras. We discuss properties of powers of matrices over these algebras and introduce a fast attack on this …
More from www.iacr.org / IACR News
Updatable Policy-Compliant Signatures
1 day, 5 hours ago |
www.iacr.org
Guess and Determine Analysis Based on Set Split
1 day, 5 hours ago |
www.iacr.org
Improving Generic Attacks Using Exceptional Functions
1 day, 5 hours ago |
www.iacr.org
Real-Valued Somewhat-Pseudorandom Unitaries
2 days, 8 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Information Technology Specialist II: Network Architect
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
DevSecOps Engineer
@ SIXGEN | Remote
Senior DevSecOps Engineer
@ nou Systems, Inc. | Huntsville AL, Huntsville, AL, US
Security Engineer (f/m/d)
@ Enpal B.V. | Berlin, Germany