You are currently offline. Some features of the site may not work correctly.

# Anshel–Anshel–Goldfeld key exchange

Known as: Anshel-Anshel-Goldfeld key exchange, Commutator key exchange, Goldfeld
Anshel–Anshel–Goldfeld protocol, also known as a commutator key exchange, is a key-exchange protocol using nonabelian groups. It was invented by Drs… Expand
Wikipedia

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
• 2016
• Corpus ID: 118113324
Abstract Building on work of Hardy and Ramanujan, Rademacher proved a well-known formula for the values of the ordinary partition… Expand
2014
2014
• 2014
• Corpus ID: 119265948
For $m\ge 2$, let $\pi$ be an irreducible cuspidal automorphic representation of $GL_m(\mathbb{A}_{\mathbb{Q}})$ with unitary… Expand
2011
2011
Early (2 weeks) vs. late (8 weeks) initiation of highly active antiretroviral treatment (HAART) significantly enhance survival of… Expand
2009
2009
• Groups Complex. Cryptol.
• 2009
• Corpus ID: 7831052
The Anshel-Anshel-Goldfeld-Lemieux (abbreviated AAGL) key agreement protocol [Contemp. Math. 418: 1–34, 2006] is proposed to be… Expand
Highly Cited
2007
Highly Cited
2007
• Public Key Cryptography
• 2007
• Corpus ID: 17091321
The length based attack on Anshel-Anshel-Goldfeld commutator key-exchange protocol [1] was initially proposed by Hughes and… Expand
2007
2007
• 2007
• Corpus ID: 14671790
Cryptography based on noncommutative algebra still suffers from lack of schemes and lack of interest. In this work, we show new… Expand
2005
2005
• 2005
• Corpus ID: 7677441
Abstract The initial version of the Birch and Swinnerton-Dyer conjecture concerned asymptotics for partial Euler products for an… Expand
Highly Cited
2004
Highly Cited
2004
The classical class number problem of Gauss asks for a classification of all imaginary quadratic fields with a given class number… Expand
Highly Cited
2003
Highly Cited
2003
• IACR Cryptol. ePrint Arch.
• 2003
• Corpus ID: 2210
In this note, we describe a probabilistic attack on public key cryptosystems based on the word/conjugacy problems for finitely… Expand
1982
1982
• 1982
• Corpus ID: 154432192
Economic theory suggests that demand be- occurred within the period. If the structure has havior is time variant, but does not… Expand