default search action
Groups Complexity Cryptology, Volume 4
Volume 4, Number 1, May 2012
- Kashi Neupane:
Two-party key establishment: From passive to active security without introducing new assumptions. 1-17 - Dima Grigoriev, Sergey I. Nikolenko:
Continuous hard-to-invert functions and biometric authentication. 19-32 - James B. Wilson:
Existence, algorithms, and asymptotics of direct product decompositions, I. 33-72 - Mark L. Lewis, James B. Wilson:
Isomorphism in expanding families of indistinguishable groups. 73-110 - Ivo Hedtke, Sandeep Murthy:
Search and test algorithms for triple product property triples. 111-133 - Matthew J. Craven, Henri C. Jimbo:
Evolutionary algorithm solution of the multiple conjugacy search problem in groups, and its applications to cryptography. 135-165 - Mohammad Eftekhari:
A Diffie-Hellman key exchange protocol using matrices over noncommutative rings. 167-176 - Dima Grigoriev, Vladimir Shpilrain:
No-leak authentication by the Sherlock Holmes method. 177-189
Volume 4, Number 2, December 2012
- Vitalii Roman'kov:
Equations over groups. 191-239 - Markus Lohrey:
Algorithmics on SLP-compressed strings: A survey. 241-299 - Murray Elder, Andrew Rechnitzer, Thomas Wong:
On the cogrowth of Thompson's group F. 301-320 - Volker Diekert, Andrew J. Duncan, Alexei G. Myasnikov:
Cyclic rewriting and conjugacy problems. 321-355 - Fedaa Ibrahim:
Cylinders, multi-cylinders and the induced action of Aut(Fn). 357-375 - Delaram Kahrobaei, Charalambos Koupparis:
Non-commutative digital signatures. 377-384
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.