(n, t)-threshold scheme 1
GF(pn) 1
3-colouring 1
abelian group 1
abelianization 1
active attacker 1
adaptive chosen message attack 1
AES 1
affine cipher 1
Ajtai-Dwork cryptosystem 1
Ajtai hash function 1
AKS algorithm 1
Alberti code 1
algebraic attack 1
– ciphertext-only 1
– known plaintext 1
– public key system 1
algebraic closure 1
algebraic eraser method 1
algebraic extension 1
algebraically closed 1
amalgam factors 1
Artin presentation 1
associated subgroups 1
asymmetric cryptography 1
asymptotically equal 1
Atabash code 1
– length based 1
authentication protocol 1
average case complexity 1
Babai’s algorithm 1
baby step giant step algorithm 1
base 1
base field equation 1
base field ideal 1
Big O-Little o Notation 1
Blakely scheme 1
braid group on n strands 1
broken cryptosystem 1
Buchberger’s algorithm 1
Buchberger’s procedure 1
– for modules 1
Buchberger-Moller algorithm 1
caesar code 1
Carmichael number 1
Cayley Table 1
CCM Mode 1
characteristic of a field 1
characteristic term attack 1
Chinese Remainder Theorem 1
chosen plaintext attack 1
cipher text only attack 1
ciphertext 1
classical cryptography 1
closest vector problem 1
closest vector secret sharing protocol 1
closest vector theorem 1
code 1
collision resistant 1
combinatorial group theory 1
commutative ring 1
commutator subgroup 1
complete lattice 1
component elimination module 1
computational security 1
congruence modulo n 1
congruence motion 1
conjugacy problem 1
conjugate subgroups 1
conjugator search problem 1, 2
coprime 1
cracking problem 1
critical pair 1
– classical 1
– commutative Gröbner basis 1
– Courtois toy cipher 1
– free group 2
– graph 1
– colouring 2
– graph p-colouring 1
– graph perfect code 1
– Gröbner basis 1
– Polly Cracker 1
– Polly Two 2
cuttingnumber 1
CVP 1
cyclic group 1
data rate 1
decision Diffie-Hellman problem 1
decryption 1
defining relator 1
degree of a divisor 1
degree of an extension 1
DES 1
diagonal ideal 1
Diffie-Hellman Key Exchange 1
Diffie-Hellman Problem 1
Diffie-Hellman zero-knowledge protocol 1
digest 1
digital forgeries 1
digital signature protocol 1
digital signing algorithm 1
– infinite 1
discrete logarithm 1
discriminant 1
– non-commutative 1
divisor 1
ECB Mode 1
ECDSA 1
ECES 1
ElGamal Signature Method 1
elimination ideal 1
elimination ordering 1
elliptic curve cryptosystem 1
elliptic curve ElGamal cryptosystem 1
elliptic curve elliptography 1
elliptic curve encryption scheme 1
embedding degree 1
encryption 1
Enigma Machine 1
enumerative procedure 1
enveloping algebra 1
Euclidean algorithm 1
Euclidean group 1
Euler phi function 1
Euler’s Theorem 1
exponential time algorithm 1
exponential time problem 1
extension field 1
F-isomorphism 1
factor group 1
factorization problem 1
fair strategy 1
Feistel network 1
Fermat factorization method 1
Fermat’s primality test 1
Fermat’s theorem 1
finite extension 1
free abelian group 1
free associative algebra 1
free basis 1
free group 1
– rank 1
free group cryptosystem 1
free length 1
free monoid 1
free part 1
free products with amalgamation 1, 2
free reduction 1
freely reduced 1
Friedman test, 1
Friedmann Coincidence Index 1
Fuchsian group 1
Fundamental Theorem of Algebra 1
Galois field 1
Garside normal form 1
gaussian heuristic 1
generators 1
generic case complexity 1
generic complexity 1
geometry of numbers 1
GGH cryptosystem 1
Gram-Schmidt process 1
graph 1
ground field 1
– abelian 1
– cyclic 1
– finite 1
– finitely generated 1
– finitely presented 1
– finitely related 1
– generating system 1
– infinite 1
– relations 1
– relator 1
group amalgams 1
group based cryptography 1
group decision problems 1
group homomorphism 1
group products 1
group ring 1
group table 1
– partial 1
GSO 1
hadamard ratio 1
handle 1
handle reduction 1
hash value 1
HFE challenge 1
HKZ algorithm 1
HNN extension 1
ideal 1
– base field 1
– diagonal 1
– elimination 1
– finitely generated 1
– leadingword 1
– left 1
– right 1
– two-sided 1
– zero set 1
indeterminate 1
index calculus method 1
industrial grade primes 1
information-theoretic security 1
integer programming attack 1
integral lattice 1
intermediate field 1
irreducible polynomial 1
isometry 1
isomorphism problem 1
iterated block cipher 1
Kasiski test 1
key exchange protocol 1
key generation algorithm 1
key only attack 1
key space 1
key stream 1
keystream gemerator 1
known message attack 1
known plaintext attack 1
Korselt citerion 1
Kronecker’s Theorem 1
Lagrange’s theorem 1
lattice 1
– determinant 1
– fundamental domain 1
– good basis 1
lattice based cryptography 1
lattice basis 1
lattice basis reduction 1
lattice redcution algorithm 1
leading term ideal 1
leading term module 1
leading word 1
leading word ideal 1
Legendre symbol 1
length based attack 1
letter 1
linear congruence generator 1
linear shift feedback generator 1
LLL algorithm 1
Lucas-Lehmer test 1
Macaulay’s basis theorem 1, 2, 3
Magnus representation 1
mathematical cryptography 1
MCA 1
Meneses-Vanstone Cryptosystem 1
Mersenne prime 1
message authentication code 1
message expansion 1
message unit 1
minimal polynomial 1
Minkowski’s theorem 1
modular group 1
modular square root 1
multiplicative function 1
multiplicative relation 1
Nielsen-Schreier Theorem 1
non-commutative algebraic cryptography 1
non-commutative cryptography 1
non-deterministic polynomial time 1
normal subgroup 1
NP Complete 1
NP-hard 1
NTRU cryptosystem 1
obstruction 1
– withoutoverlap 1
one-time pad 1
order ideal 1
order of an element 1
order of magnitude 1
P=NP 1
padding 1
passive attacker 1
perfect code 1
perfect security 1
permutation 1
permutation group 1
plaintext 1
Pollard algorithm 1
Polly Cracker cryptosystem 1
polyalphabetic ciphers 1
polynomial 1
– degree 1
– logical representation 1
polynomial ring 1
– non-commutative 1
polynomial time algorithm 1
polynomial time problem 1
practical security 1
preimage resistant 1
primality test
– deterministic 1
– probabilistic 1
primality testing 1
principal divisor 1
principal ideal 1
private key 1
probable primes 1
product cipher 1
pseudoprime 1
public key 1
public key cryptography 1, 2, 3, 4
public key encryption map 1
quadratic residue 1
quadratic sieve 1
quantum algorithm 1
quotient group 1
Rabin Cryptosystem 1
Rabin Encryption 1
Reidemeister-Schreier Process 1
relations 1
relatively prime 1
residue 1
residue class 1
Rijnadel cipher 1
ring 1
– commutative 1
root of a polynomial 1
round 1
round keys 1
RSA Algorithm 1
RSA cryptanalysis 1
RSA Problem 1
RSA Protocol 1
RSA secure primes 1
RSA Signature Method 1
S-box 1
S-vector 1
SAT attack 1
secret key 1
secret sharing scheme 1
security reduction 1
secutity proof 1
self-obstruction 1
semantic security 1
semi-decision procedure 1
Shamir Secret Sharing Scheme 1
shift cipher 1
Shor’s algorithm 1
shortest vector problem 1
side channel attack 1
sieve 1
Sieve of Eratosthenes 1
sieving methods 1
signature 1
social security control group 1
soundness error 1
special linear group 1
splits 1
splitting field 1
SQ-universality 1
stabilizer 1
stable letters 1
standard conversion strategy 1
statistical frequency attack 1
stream cipher 1
– softwaregeneration 1
stream ciphers 1
strong pseudoprime 1
subalgebra membership problem 1
subgroup 1
– conjugate 1
substitution cipher 1
substitution-permutation network 1
subword 1
successful attack 1
summit set 1
SVP 1
syllable length 1
symmetric group 1
symmetric key cryptography 1, 2, 3
symmetry group 1
system of generators 1
syzygy module 1
– computation 1
Tate pairing 1
term ordering 1
– component elimination 1
– degree reverse lexicographic 1
– lexicographic 1
– module 1
The Class NP 1
The Fermat Primality Test 1
The Modular Group 1
The MOV Algorithm 1
theoretical security 1
transcendental extension 1
transposition 1
verification 1
vernam ciphers 1
Vernam key-pad 1
Vigenere code 1
Vigenere cryptosystems 1
Weierstrass form 1
Weil-pairing 1
well-ordering 1
witness 1
– cyclically reduced 1
– empty 1
– length 1
– reduced 1
– trivial 1
word ordering 1
– elimination 1
– length-lexicographic 1
– lexicographic 1
– generalized 1
XOR Operation 1
zero of a polynomial 1
3.133.79.70