default search action
Alexander Ushakov
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j26]Richard Mandel, Alexander Ushakov:
Quadratic equations in metabelian Baumslag-Solitar groups. Int. J. Algebra Comput. 33(6): 1195-1216 (2023) - 2021
- [j25]Mitra Modi, Mathew Seedhom, Alexander Ushakov:
Linear time algorithm for the conjugacy problem in the first Grigorchuk group. Int. J. Algebra Comput. 31(4): 789-806 (2021) - [j24]Matvei Kotov, Anton Menshov, Alexander Ushakov:
Attack on Kayawood protocol: uncloaking private keys. J. Math. Cryptol. 15(1): 237-249 (2021) - 2019
- [j23]Matvei Kotov, Anton Menshov, Alexander Ushakov:
An attack on the Walnut digital signature algorithm. Des. Codes Cryptogr. 87(10): 2231-2250 (2019) - [j22]Dmitry Panteleev, Alexander Ushakov:
Conjugacy search problem and the Andrews-Curtis conjecture. Groups Complex. Cryptol. 11(1): 43-60 (2019) - 2018
- [j21]Matvei Kotov, Dmitry Panteleev, Alexander Ushakov:
Analysis of secret sharing schemes based on Nielsen transformations. Groups Complex. Cryptol. 10(1): 1-8 (2018) - [j20]Matvei Kotov, Alexander Ushakov:
Analysis of a key exchange protocol based on tropical matrix algebra. J. Math. Cryptol. 12(3): 137-141 (2018) - [j19]Andrey Nikolaev, Alexander Ushakov:
Subset sum problem in polycyclic groups. J. Symb. Comput. 84: 84-94 (2018) - 2016
- [j18]Alexander Ushakov:
Authenticated commutator key agreement protocol. Groups Complex. Cryptol. 8(2): 127-133 (2016) - [j17]Alexei Miasnikov, Alexander Ushakov:
Generic case completeness. J. Comput. Syst. Sci. 82(8): 1268-1282 (2016) - [j16]Elizaveta Frenkel, Andrey Nikolaev, Alexander Ushakov:
Knapsack problems in products of groups. J. Symb. Comput. 74: 96-108 (2016) - 2015
- [j15]Pavel Morar, Alexander Ushakov:
Search problems in groups and branching processes. Int. J. Algebra Comput. 25(3): 445-480 (2015) - [j14]Matvei Kotov, Alexander Ushakov:
Analysis of a certain polycyclic-group-based cryptosystem. J. Math. Cryptol. 9(3): 161-167 (2015) - [j13]Alexei G. Myasnikov, Andrey Nikolaev, Alexander Ushakov:
Knapsack problems in groups. Math. Comput. 84(292): 987-1016 (2015) - 2014
- [j12]Alexey D. Myasnikov, Alexander Ushakov:
Quantum algorithm for discrete logarithm problem for matrices over finite group rings. Groups Complex. Cryptol. 6(1): 31-36 (2014) - [j11]Alex D. Myasnikov, Alexander Ushakov:
Cryptanalysis of matrix conjugation schemes. J. Math. Cryptol. 8(2): 95-114 (2014) - 2012
- [j10]Alexei G. Myasnikov, Alexander Ushakov, Dong Wook Won:
Power Circuits, exponential Algebra, and Time Complexity. Int. J. Algebra Comput. 22(6) (2012) - [j9]Volker Diekert, Jürn Laun, Alexander Ushakov:
Efficient Algorithms for Highly Compressed Data: the Word Problem in Higman's Group is in P. Int. J. Algebra Comput. 22(8) (2012) - 2011
- [j8]Natalia Mosina, Alexander Ushakov:
Strong law of large numbers on graphs and groups. Groups Complex. Cryptol. 3(1): 67-103 (2011) - [j7]Alexei G. Myasnikov, Alexander Ushakov:
Random van Kampen diagrams and algorithmic problems in groups. Groups Complex. Cryptol. 3(1): 121-185 (2011) - 2010
- [j6]Natalia Mosina, Alexander Ushakov:
Mean-set attack: cryptanalysis of Sibert et al. authentication protocol. J. Math. Cryptol. 4(2): 149-174 (2010) - 2009
- [j5]Alex D. Myasnikov, Alexander Ushakov:
Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux Key Agreement Protocol. Groups Complex. Cryptol. 1(1): 63-75 (2009) - [j4]Jonathan Longrigg, Alexander Ushakov:
A Practical Attack on a Certain Braid Group Based Shifted Conjugacy Authentication Protocol. Groups Complex. Cryptol. 1(2): 275-286 (2009) - 2008
- [j3]Alexei G. Myasnikov, Alexander Ushakov:
Random subgroups and analysis of the length-based and quotient attacks. J. Math. Cryptol. 2(1): 29-61 (2008) - [j2]Jonathan Longrigg, Alexander Ushakov:
Cryptanalysis of the shifted conjugacy authentication protocol. J. Math. Cryptol. 2(2): 109-116 (2008) - 2006
- [j1]Vladimir Shpilrain, Alexander Ushakov:
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient. Appl. Algebra Eng. Commun. Comput. 17(3-4): 285-289 (2006)
Conference and Workshop Papers
- 2024
- [c9]Caroline Mattes, Alexander Ushakov, Armin Weiß:
Complexity of Spherical Equations in Finite Groups. SOFSEM 2024: 383-397 - 2020
- [c8]Andrey Ivanov, Dmitry Lakontsev, Alexey Fisenko, Alexander Ushakov:
Soft Decision Decoding in Mud Pulse Telemetry System. VTC Spring 2020: 1-5 - 2014
- [c7]Martin Kreuzer, Alexey D. Myasnikov, Alexander Ushakov:
A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols. ACNS 2014: 37-43 - 2012
- [c6]Volker Diekert, Jürn Laun, Alexander Ushakov:
Efficient algorithms for highly compressed data: The Word Problem in Higman's group is in P. STACS 2012: 218-229 - 2008
- [c5]Vladimir Shpilrain, Alexander Ushakov:
An Authentication Scheme Based on the Twisted Conjugacy Problem. ACNS 2008: 366-372 - 2007
- [c4]Alex D. Myasnikov, Alexander Ushakov:
Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol. Public Key Cryptography 2007: 76-88 - 2006
- [c3]Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov:
Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol. Public Key Cryptography 2006: 302-314 - 2005
- [c2]Vladimir Shpilrain, Alexander Ushakov:
Thompson's Group and Public Key Cryptography. ACNS 2005: 151-163 - [c1]Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov:
A Practical Attack on a Braid Group Based Cryptographic Protocol. CRYPTO 2005: 86-96
Informal and Other Publications
- 2023
- [i25]Caroline Mattes, Alexander Ushakov, Armin Weiß:
Complexity of Spherical Equations in Finite Groups. CoRR abs/2308.12841 (2023) - 2020
- [i24]Andrey Nikolaev, Alexander Ushakov:
On subset sum problem in branch groups. CoRR abs/2006.03470 (2020) - 2018
- [i23]Matvei Kotov, Anton Menshov, Alexander Ushakov:
AN ATTACK ON THE WALNUT DIGITAL SIGNATURE ALGORITHM. IACR Cryptol. ePrint Arch. 2018: 393 (2018) - [i22]Matvei Kotov, Anton Menshov, Alex D. Myasnikov, Dmitry Panteleev, Alexander Ushakov:
Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2018: 491 (2018) - [i21]Matvei Kotov, Anton Menshov, Alexander Ushakov:
Attack on Kayawood Protocol: Uncloaking Private Keys. IACR Cryptol. ePrint Arch. 2018: 604 (2018) - 2017
- [i20]Andrey Nikolaev, Alexander Ushakov:
Subset sum problem in polycyclic groups. CoRR abs/1703.07406 (2017) - 2016
- [i19]Alexei Miasnikov, Alexander Ushakov:
Generic case completeness. CoRR abs/1606.01172 (2016) - 2015
- [i18]Alexei G. Myasnikov, Andrey Nikolaev, Alexander Ushakov:
Non-commutative lattice problems. CoRR abs/1508.02388 (2015) - [i17]Jintai Ding, Alexei Miasnikov, Alexander Ushakov:
A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups. IACR Cryptol. ePrint Arch. 2015: 18 (2015) - [i16]Matvei Kotov, Alexander Ushakov:
Analysis of a key exchange protocol based on tropical matrix algebra. IACR Cryptol. ePrint Arch. 2015: 852 (2015) - 2014
- [i15]Elizaveta Frenkel, Andrey Nikolaev, Alexander Ushakov:
Knapsack problems in products of groups. CoRR abs/1408.6509 (2014) - 2013
- [i14]Alexei G. Myasnikov, Andrey Nikolaev, Alexander Ushakov:
Knapsack Problems in Groups. CoRR abs/1302.5671 (2013) - [i13]Alexei G. Myasnikov, Andrey Nikolaev, Alexander Ushakov:
The Post correspondence problem in groups. CoRR abs/1310.5246 (2013) - 2012
- [i12]Alex D. Myasnikov, Alexander Ushakov:
Quantum algorithm for the discrete logarithm problem for matrices over finite group rings. IACR Cryptol. ePrint Arch. 2012: 574 (2012) - [i11]Alex D. Myasnikov, Alexander Ushakov:
Cryptanalysis of matrix conjugation schemes. IACR Cryptol. ePrint Arch. 2012: 694 (2012) - 2010
- [i10]Alexei G. Myasnikov, Alexander Ushakov, Dong Wook Won:
Power Circuits, Exponential Algebra, and Time Complexity. CoRR abs/1006.2570 (2010) - [i9]Natalia Mosina, Alexander Ushakov:
Mean-Set Attack: Cryptanalysis of Sibert et al. Authentication Protocol. CoRR abs/1006.4850 (2010) - 2008
- [i8]Vladimir Shpilrain, Alexander Ushakov:
An authentication scheme based on the twisted conjugacy problem. CoRR abs/0805.2701 (2008) - 2007
- [i7]Robert H. Gilman, Alexei G. Myasnikov, Alex D. Myasnikov, Alexander Ushakov:
Report on Generic Case Complexity. CoRR abs/0707.1364 (2007) - [i6]Alexei G. Myasnikov, Alexander Ushakov:
Random subgroups and analysis of the length-based and quotient attacks. CoRR abs/0707.1501 (2007) - [i5]Jonathan Longrigg, Alexander Ushakov:
Cryptanalysis of shifted conjugacy authentication protocol. CoRR abs/0708.1768 (2007) - 2005
- [i4]Vladimir Shpilrain, Alexander Ushakov:
Thompson's group and public key cryptography. CoRR abs/math/0505487 (2005) - [i3]Vladimir Shpilrain, Alexander Ushakov:
A new key exchange protocol based on the decomposition problem. CoRR abs/math/0512140 (2005) - [i2]Vladimir Shpilrain, Alexander Ushakov:
A new key exchange protocol based on the decomposition problem. IACR Cryptol. ePrint Arch. 2005: 447 (2005) - 2004
- [i1]Vladimir Shpilrain, Alexander Ushakov:
The conjugacy search problem in public key cryptography: unnecessary and insufficient. IACR Cryptol. ePrint Arch. 2004: 321 (2004)
Coauthor Index
aka: Alexei Miasnikov
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint