Jump to content

Talk:Non-commutative cryptography

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Widefox (talk | contribs) at 11:24, 5 October 2016 (Assessment: +Cryptography: class=Start, importance=Low; +Computing: class=Start, importance=Low, science=y, science-importance=Low (assisted)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WikiProject iconCryptography: Computer science Start‑class Low‑importance
WikiProject iconThis article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
LowThis article has been rated as Low-importance on the importance scale.
Taskforce icon
This article is supported by WikiProject Computer science (assessed as Low-importance).
WikiProject iconComputing: CompSci Start‑class Low‑importance
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
LowThis article has been rated as Low-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computer science (assessed as Low-importance).
Things you can help WikiProject Computer science with:

I'm suspicious the article might be rather "biased by omission". I'm not an expert in the area but my limited understanding was that : - Few cryptographers have investigated these system, but - All systems based on non-abelian groups that were seriously examined were broken. https://crypto.stackexchange.com/questions/18680/how-dead-is-braid-based-cryptography — Preceding unsigned comment added by 78.206.228.75 (talk) 21:42, 13 February 2016 (UTC)[reply]