LEADER 03759nam 2200757z- 450 001 9910404086703321 005 20231214133644.0 010 $a3-03928-803-2 035 $a(CKB)4100000011302271 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/50457 035 $a(EXLCZ)994100000011302271 100 $a20202102d2020 |y 0 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInteractions between Group Theory, Symmetry and Cryptology 210 $cMDPI - Multidisciplinary Digital Publishing Institute$d2020 215 $a1 electronic resource (164 p.) 311 $a3-03928-802-4 330 $aCryptography lies at the heart of most technologies deployed today for secure communications. At the same time, mathematics lies at the heart of cryptography, as cryptographic constructions are based on algebraic scenarios ruled by group or number theoretical laws. Understanding the involved algebraic structures is, thus, essential to design robust cryptographic schemes. This Special Issue is concerned with the interplay between group theory, symmetry and cryptography. The book highlights four exciting areas of research in which these fields intertwine: post-quantum cryptography, coding theory, computational group theory and symmetric cryptography. The articles presented demonstrate the relevance of rigorously analyzing the computational hardness of the mathematical problems used as a base for cryptographic constructions. For instance, decoding problems related to algebraic codes and rewriting problems in non-abelian groups are explored with cryptographic applications in mind. New results on the algebraic properties or symmetric cryptographic tools are also presented, moving ahead in the understanding of their security properties. In addition, post-quantum constructions for digital signatures and key exchange are explored in this Special Issue, exemplifying how (and how not) group theory may be used for developing robust cryptographic tools to withstand quantum attacks. 610 $aNP-Completeness 610 $aprotocol compiler 610 $apost-quantum cryptography 610 $aReed?Solomon codes 610 $akey equation 610 $aeuclidean algorithm 610 $apermutation group 610 $at-modified self-shrinking generator 610 $aideal cipher model 610 $aalgorithms in groups 610 $alightweight cryptography 610 $ageneralized self-shrinking generator 610 $anumerical semigroup 610 $apseudo-random number generator 610 $asymmetry 610 $apseudorandom permutation 610 $aBerlekamp?Massey algorithm 610 $asemigroup ideal 610 $aalgebraic-geometry code 610 $anon-commutative cryptography 610 $aprovable security 610 $aEngel words 610 $ablock cipher 610 $acryptography 610 $abeyond birthday bound 610 $aWeierstrass semigroup 610 $agroup theory 610 $abraid groups 610 $astatistical randomness tests 610 $agroup-based cryptography 610 $aalternating group 610 $aWalnutDSA 610 $aSugiyama et al. algorithm 610 $acryptanalysis 610 $adigital signatures 610 $aone-way functions 610 $akey agreement protocol 610 $aerror-correcting code 610 $agroup key establishment 700 $aGonzález Vasco$b María Isabel$4auth$01246436 906 $aBOOK 912 $a9910404086703321 996 $aInteractions between Group Theory, Symmetry and Cryptology$93032109 997 $aUNINA