Journal of Shanghai Jiaotong University
• Automation Technique, Computer Technology • Previous Articles Next Articles
CHEN Le,CAO Zhenfu
Received:
Revised:
Online:
Published:
Abstract: This paper proposed the key exchange protocol based on Thompson’s group, which controls the process of generating words, and designed experiments to show that the protocol can resist the lengthbased attack. Moreover, because the lengthbased attacks on other noncommutative groups are similar to the one on Thompson’s group, it suggests that the approaches can be applied to any other noncommutative group to resist the lengthbased attack on that group.
CLC Number:
TP309.7
CHEN Le,CAO Zhenfu. Approaches to Resisting LengthBased Attack[J]. Journal of Shanghai Jiaotong University.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: https://xuebao.sjtu.edu.cn/EN/
https://xuebao.sjtu.edu.cn/EN/Y2010/V44/I07/968