A public-key encryption scheme based on Sims’ algorithm
Proceedings of the Yerevan State University. Physical and mathematical sciences, no. 1 (2012), pp. 49-52.

Voir la notice de l'article provenant de la source Math-Net.Ru

A public-key encryption scheme is proposed, which uses a special case of Sims' algorithm for construction of "strong" generator sets for permutation groups.
Keywords: "strong" generator set, Sims' algorithm, public-key encryption.
Mots-clés : permutation group
@article{UZERU_2012_1_a8,
     author = {A. V. Soghoyan},
     title = {A public-key encryption scheme based on {Sims{\textquoteright}} algorithm},
     journal = {Proceedings of the Yerevan State University. Physical and mathematical sciences},
     pages = {49--52},
     publisher = {mathdoc},
     number = {1},
     year = {2012},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/UZERU_2012_1_a8/}
}
TY  - JOUR
AU  - A. V. Soghoyan
TI  - A public-key encryption scheme based on Sims’ algorithm
JO  - Proceedings of the Yerevan State University. Physical and mathematical sciences
PY  - 2012
SP  - 49
EP  - 52
IS  - 1
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/UZERU_2012_1_a8/
LA  - en
ID  - UZERU_2012_1_a8
ER  - 
%0 Journal Article
%A A. V. Soghoyan
%T A public-key encryption scheme based on Sims’ algorithm
%J Proceedings of the Yerevan State University. Physical and mathematical sciences
%D 2012
%P 49-52
%N 1
%I mathdoc
%U http://geodesic.mathdoc.fr/item/UZERU_2012_1_a8/
%G en
%F UZERU_2012_1_a8
A. V. Soghoyan. A public-key encryption scheme based on Sims’ algorithm. Proceedings of the Yerevan State University. Physical and mathematical sciences, no. 1 (2012), pp. 49-52. http://geodesic.mathdoc.fr/item/UZERU_2012_1_a8/

[1] C.C. Sims, “Computational Methods in the Study of Permutation Groups”, Computational Problems in Abstract Algebra, Pergamon Press, Oxford, 1970, 169–183 | MR

[2] C.C. Sims, “Computation with Permutation Groups”, Proc. Second Symposium on Symbolic and Algebraic Manipulation, ACM Press, NY, 1971, 23–28 | DOI

[3] A. Alexanyan, H. Aslanyan, A. Soghoyan, “Mathematical Problems of Computer Science”, Transactions of IPIA NAS RA, 33 (2010), 127–134

[4] A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996, 816 pp.