default search action
Search dblp for Publications
export results for "stream:journals/gcc:"
@article{DBLP:journals/gcc/Anokhin19, author = {Mikhail Anokhin}, title = {Constructing a pseudo-freefamily of finite computational groups under the generalinteger factoring intractability assumption}, journal = {Groups Complex. Cryptol.}, volume = {11}, number = {2}, pages = {133--134}, year = {2019}, url = {https://doi.org/10.1515/gcc-2019-2009}, doi = {10.1515/GCC-2019-2009}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Anokhin19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/GrigorchukG19, author = {Rostislav I. Grigorchuk and Dima Grigoriev}, title = {Key agreement based on automaton groups}, journal = {Groups Complex. Cryptol.}, volume = {11}, number = {2}, pages = {77--81}, year = {2019}, url = {https://doi.org/10.1515/gcc-2019-2012}, doi = {10.1515/GCC-2019-2012}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/GrigorchukG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/KahrobaeiM19, author = {Delaram Kahrobaei and Keivan Mallahi Karai}, title = {Some applications of arithmetic groups in cryptography}, journal = {Groups Complex. Cryptol.}, volume = {11}, number = {1}, pages = {25--33}, year = {2019}, url = {https://doi.org/10.1515/gcc-2019-2002}, doi = {10.1515/GCC-2019-2002}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/KahrobaeiM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/KharlampovichMT19, author = {Olga Kharlampovich and Alexei G. Myasnikov and Alexander Taam}, title = {Effective construction of covers of canonical Hom-diagrams for equations over torsion-free hyperbolic groups}, journal = {Groups Complex. Cryptol.}, volume = {11}, number = {2}, pages = {83--101}, year = {2019}, url = {https://doi.org/10.1515/gcc-2019-2010}, doi = {10.1515/GCC-2019-2010}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/KharlampovichMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/KrophollerS19, author = {Robert P. Kropholler and Davide Spriano}, title = {Closure properties in the class of multiple context-free groups}, journal = {Groups Complex. Cryptol.}, volume = {11}, number = {1}, pages = {1--15}, year = {2019}, url = {https://doi.org/10.1515/gcc-2019-2004}, doi = {10.1515/GCC-2019-2004}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gcc/KrophollerS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Monico19, author = {Chris Monico}, title = {Cryptanalysis of a hash function, and the modular subset sum problem}, journal = {Groups Complex. Cryptol.}, volume = {11}, number = {1}, pages = {17--23}, year = {2019}, url = {https://doi.org/10.1515/gcc-2019-2001}, doi = {10.1515/GCC-2019-2001}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Monico19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/PanteleevU19, author = {Dmitry Panteleev and Alexander Ushakov}, title = {Conjugacy search problem and the Andrews-Curtis conjecture}, journal = {Groups Complex. Cryptol.}, volume = {11}, number = {1}, pages = {43--60}, year = {2019}, url = {https://doi.org/10.1515/gcc-2019-2005}, doi = {10.1515/GCC-2019-2005}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gcc/PanteleevU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/PramanikA19, author = {Jyotirmoy Pramanik and Avishek Adhikari}, title = {Ramp secret sharing with cheater identification in presence of rushing cheaters}, journal = {Groups Complex. Cryptol.}, volume = {11}, number = {2}, pages = {103--113}, year = {2019}, url = {https://doi.org/10.1515/gcc-2019-2006}, doi = {10.1515/GCC-2019-2006}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/PramanikA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Romankov19, author = {Vitalii Roman'kov}, title = {An improved version of the {AAG} cryptographic protocol}, journal = {Groups Complex. Cryptol.}, volume = {11}, number = {1}, pages = {35--41}, year = {2019}, url = {https://doi.org/10.1515/gcc-2019-2003}, doi = {10.1515/GCC-2019-2003}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Romankov19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/SchleimerW19, author = {Saul Schleimer and Bert Wiest}, title = {Garside theory and subsurfaces: Some examples in braid groups}, journal = {Groups Complex. Cryptol.}, volume = {11}, number = {2}, pages = {61--75}, year = {2019}, url = {https://doi.org/10.1515/gcc-2019-2007}, doi = {10.1515/GCC-2019-2007}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/SchleimerW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/ShamsabadDR19, author = {Mohammad Reza Mirzaee Shamsabad and Seyed Mojtaba Dehnavi and Akbar Mahmoodi Rishakani}, title = {Randomized nonlinear software-oriented {MDS} diffusion layers}, journal = {Groups Complex. Cryptol.}, volume = {11}, number = {2}, pages = {123--131}, year = {2019}, url = {https://doi.org/10.1515/gcc-2019-2011}, doi = {10.1515/GCC-2019-2011}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/ShamsabadDR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Shevlyakov19, author = {Artem N. Shevlyakov}, title = {On group automorphisms in universal algebraic geometry}, journal = {Groups Complex. Cryptol.}, volume = {11}, number = {2}, pages = {115--121}, year = {2019}, url = {https://doi.org/10.1515/gcc-2019-2008}, doi = {10.1515/GCC-2019-2008}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Shevlyakov19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Anokhin18, author = {Mikhail Anokhin}, title = {A certain family of subgroups of {\(\mathbb{Z}\)}\({}_{\mbox{n}}\)\({}^{\mbox{*}}\) is weakly pseudo-free under the general integer factoring intractability assumption}, journal = {Groups Complex. Cryptol.}, volume = {10}, number = {2}, pages = {99--110}, year = {2018}, url = {https://doi.org/10.1515/gcc-2018-0007}, doi = {10.1515/GCC-2018-0007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Anokhin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Asboei18, author = {Alireza Khalili Asboei}, title = {Recognition of 2-dimensional projective linear groups by the group order and the set of numbers of its elements of each order}, journal = {Groups Complex. Cryptol.}, volume = {10}, number = {2}, pages = {111--118}, year = {2018}, url = {https://doi.org/10.1515/gcc-2018-0011}, doi = {10.1515/GCC-2018-0011}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Asboei18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/FineGRS18, author = {Benjamin Fine and Anthony M. Gaglione and Gerhard Rosenberger and Dennis Spellman}, title = {Orderable groups, elementary theory, and the Kaplansky conjecture}, journal = {Groups Complex. Cryptol.}, volume = {10}, number = {1}, pages = {43--52}, year = {2018}, url = {https://doi.org/10.1515/gcc-2018-0005}, doi = {10.1515/GCC-2018-0005}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/FineGRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/GhaffariM18, author = {Mohammad Hossein Ghaffari and Zohreh Mostaghim}, title = {More secure version of a Cayley hash function}, journal = {Groups Complex. Cryptol.}, volume = {10}, number = {1}, pages = {29--32}, year = {2018}, url = {https://doi.org/10.1515/gcc-2018-0002}, doi = {10.1515/GCC-2018-0002}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/GhaffariM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/GilmanKS18, author = {Robert H. Gilman and Robert P. Kropholler and Saul Schleimer}, title = {Groups whose word problems are not semilinear}, journal = {Groups Complex. Cryptol.}, volume = {10}, number = {2}, pages = {53--62}, year = {2018}, url = {https://doi.org/10.1515/gcc-2018-0010}, doi = {10.1515/GCC-2018-0010}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/GilmanKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/GribovKS18, author = {Alexey Gribov and Delaram Kahrobaei and Vladimir Shpilrain}, title = {Practical private-key fully homomorphic encryption in rings}, journal = {Groups Complex. Cryptol.}, volume = {10}, number = {1}, pages = {17--27}, year = {2018}, url = {https://doi.org/10.1515/gcc-2018-0006}, doi = {10.1515/GCC-2018-0006}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/GribovKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Ho18, author = {Meng{-}Che Ho}, title = {The word problem of {\(\mathbb{Z}\)} n is a multiple context-free language}, journal = {Groups Complex. Cryptol.}, volume = {10}, number = {1}, pages = {9--15}, year = {2018}, url = {https://doi.org/10.1515/gcc-2018-0003}, doi = {10.1515/GCC-2018-0003}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Ho18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/KalubaN18, author = {Marek Kaluba and Piotr W. Nowak}, title = {Certifying numerical estimates of spectral gaps}, journal = {Groups Complex. Cryptol.}, volume = {10}, number = {1}, pages = {33--41}, year = {2018}, url = {https://doi.org/10.1515/gcc-2018-0004}, doi = {10.1515/GCC-2018-0004}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/KalubaN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/KotovPU18, author = {Matvei Kotov and Dmitry Panteleev and Alexander Ushakov}, title = {Analysis of secret sharing schemes based on Nielsen transformations}, journal = {Groups Complex. Cryptol.}, volume = {10}, number = {1}, pages = {1--8}, year = {2018}, url = {https://doi.org/10.1515/gcc-2018-0001}, doi = {10.1515/GCC-2018-0001}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gcc/KotovPU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Romankov18, author = {Vitaly Roman'kov}, title = {Two general schemes of algebraic cryptography}, journal = {Groups Complex. Cryptol.}, volume = {10}, number = {2}, pages = {83--98}, year = {2018}, url = {https://doi.org/10.1515/gcc-2018-0009}, doi = {10.1515/GCC-2018-0009}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Romankov18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/SilvaZ18, author = {Pedro V. Silva and Alexander Zakharov}, title = {On finitely generated submonoids of virtually free groups}, journal = {Groups Complex. Cryptol.}, volume = {10}, number = {2}, pages = {63--82}, year = {2018}, url = {https://doi.org/10.1515/gcc-2018-0008}, doi = {10.1515/GCC-2018-0008}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gcc/SilvaZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Anokhin17, author = {Mikhail Anokhin}, title = {Pseudo-free families of finite computationalelementary abelian p-groups}, journal = {Groups Complex. Cryptol.}, volume = {9}, number = {1}, pages = {1}, year = {2017}, url = {https://doi.org/10.1515/gcc-2017-0001}, doi = {10.1515/GCC-2017-0001}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Anokhin17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Button17, author = {Jack O. Button}, title = {Free by cyclic groups and linear groups with restricted unipotent elements}, journal = {Groups Complex. Cryptol.}, volume = {9}, number = {2}, pages = {137--149}, year = {2017}, url = {https://doi.org/10.1515/gcc-2017-0009}, doi = {10.1515/GCC-2017-0009}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Button17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/ChauvetM17, author = {Jean{-}Marie Chauvet and Eric Mahe}, title = {Cryptography from the tropical Hessian pencil}, journal = {Groups Complex. Cryptol.}, volume = {9}, number = {1}, pages = {19}, year = {2017}, url = {https://doi.org/10.1515/gcc-2017-0002}, doi = {10.1515/GCC-2017-0002}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/ChauvetM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/EickE17, author = {Bettina Eick and Ann{-}Kristin Engel}, title = {The isomorphism problem for torsion free nilpotent groups of Hirsch length at most 5}, journal = {Groups Complex. Cryptol.}, volume = {9}, number = {1}, pages = {55}, year = {2017}, url = {https://doi.org/10.1515/gcc-2017-0004}, doi = {10.1515/GCC-2017-0004}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/EickE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Friedl17, author = {Stefan Friedl}, title = {An elementary proof of the group law for elliptic curves}, journal = {Groups Complex. Cryptol.}, volume = {9}, number = {2}, pages = {117--123}, year = {2017}, url = {https://doi.org/10.1515/gcc-2017-0010}, doi = {10.1515/GCC-2017-0010}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Friedl17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/GarretaMO17, author = {Albert Garreta and Alexei Miasnikov and Denis Ovchinnikov}, title = {Random nilpotent groups, polycyclic presentations, and Diophantine problems}, journal = {Groups Complex. Cryptol.}, volume = {9}, number = {2}, pages = {99--115}, year = {2017}, url = {https://doi.org/10.1515/gcc-2017-0007}, doi = {10.1515/GCC-2017-0007}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/GarretaMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/MarkoZJ17, author = {Frantisek Marko and Alexandr N. Zubkov and Martin Jur{\'{a}}s}, title = {Public-key cryptosystem based on invariants of diagonalizable groups}, journal = {Groups Complex. Cryptol.}, volume = {9}, number = {1}, pages = {31}, year = {2017}, url = {https://doi.org/10.1515/gcc-2017-0003}, doi = {10.1515/GCC-2017-0003}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/MarkoZJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/MiasnikovV17, author = {Alexei Miasnikov and Svetla Vassileva}, title = {Log-space conjugacy problem in the Grigorchuk group}, journal = {Groups Complex. Cryptol.}, volume = {9}, number = {1}, pages = {77}, year = {2017}, url = {https://doi.org/10.1515/gcc-2017-0005}, doi = {10.1515/GCC-2017-0005}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/MiasnikovV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/MishchenkoT17, author = {Alexei Mishchenko and Alexander Treier}, title = {Knapsack problem for nilpotent groups}, journal = {Groups Complex. Cryptol.}, volume = {9}, number = {1}, pages = {87}, year = {2017}, url = {https://doi.org/10.1515/gcc-2017-0006}, doi = {10.1515/GCC-2017-0006}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gcc/MishchenkoT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Romankov17, author = {Vitalii Roman'kov}, title = {Cryptanalysis of a combinatorial public key cryptosystem}, journal = {Groups Complex. Cryptol.}, volume = {9}, number = {2}, pages = {125--135}, year = {2017}, url = {https://doi.org/10.1515/gcc-2017-0013}, doi = {10.1515/GCC-2017-0013}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Romankov17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Rybalov17, author = {Alexander N. Rybalov}, title = {Generic hardness of the Boolean satisfiability problem}, journal = {Groups Complex. Cryptol.}, volume = {9}, number = {2}, pages = {151--154}, year = {2017}, url = {https://doi.org/10.1515/gcc-2017-0008}, doi = {10.1515/GCC-2017-0008}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Rybalov17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/ShahryariS17, author = {Mohammad Shahryari and Artem N. Shevlyakov}, title = {Direct products, varieties, and compactness conditions}, journal = {Groups Complex. Cryptol.}, volume = {9}, number = {2}, pages = {159--166}, year = {2017}, url = {https://doi.org/10.1515/gcc-2017-0011}, doi = {10.1515/GCC-2017-0011}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/ShahryariS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Timoshenko17, author = {Evgeny I. Timoshenko}, title = {A remark on spherical equations in free metabelian groups}, journal = {Groups Complex. Cryptol.}, volume = {9}, number = {2}, pages = {155--158}, year = {2017}, url = {https://doi.org/10.1515/gcc-2017-0012}, doi = {10.1515/GCC-2017-0012}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Timoshenko17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/AkchicheK16, author = {Omar Akchiche and Omar Khadir}, title = {Factoring multi-power {RSA} moduli with primes sharing least or most significant bits}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {1}, pages = {47--54}, year = {2016}, url = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0002/gcc-2016-0002.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/AkchicheK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/AnshelAGG16, author = {Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E. Gunnells}, title = {A class of hash functions based on the algebraic eraser{\texttrademark}}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {1}, pages = {1--7}, year = {2016}, url = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0004/gcc-2016-0004.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/AnshelAGG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/BlaneyN16, author = {Kenneth R. Blaney and Andrey Nikolaev}, title = {A {PTIME} solution to the restricted conjugacy problem in generalized Heisenberg groups}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {1}, pages = {69--74}, year = {2016}, url = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0003/gcc-2016-0003.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/BlaneyN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/CravenR16, author = {Matthew J. Craven and Daniel Robertz}, title = {A parallel evolutionary approach to solving systems of equations in polycyclic groups}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {2}, pages = {109--125}, year = {2016}, url = {https://doi.org/10.1515/gcc-2016-0012}, doi = {10.1515/GCC-2016-0012}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gcc/CravenR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/DuquesneG16, author = {Sylvain Duquesne and Loubna Ghammam}, title = {Memory-saving computation of the pairing final exponentiation on {BN} curves}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {1}, pages = {75--90}, year = {2016}, url = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0006/gcc-2016-0006.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/DuquesneG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Eick16, author = {Bettina Eick}, title = {The automorphism group of a finitely generated virtually abelian group}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {1}, pages = {35--45}, year = {2016}, url = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0007/gcc-2016-0007.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Eick16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/ElderT16, author = {Murray Elder and Jennifer Taback}, title = {Thompson's group {F} is 1-counter graph automatic}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {1}, pages = {21--33}, year = {2016}, url = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0001/gcc-2016-0001.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/ElderT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/FouotsaC16, author = {Emmanuel Fouotsa and Abdoul Aziz Ciss}, title = {Faster Ate pairing computation on Selmer's model of elliptic curves}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {1}, pages = {55--67}, year = {2016}, url = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0005/gcc-2016-0005.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/FouotsaC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/GryakK16, author = {Jonathan Gryak and Delaram Kahrobaei}, title = {The status of polycyclic group-based cryptography: {A} survey and open problems}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {2}, pages = {171--186}, year = {2016}, url = {https://doi.org/10.1515/gcc-2016-0013}, doi = {10.1515/GCC-2016-0013}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/GryakK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/KappeNS16, author = {Luise{-}Charlotte Kappe and Daniela Nikolova{-}Popova and Eric Swartz}, title = {On the covering number of small symmetric groups and some sporadic simple groups}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {2}, pages = {135--154}, year = {2016}, url = {https://doi.org/10.1515/gcc-2016-0010}, doi = {10.1515/GCC-2016-0010}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/KappeNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/NoskovR16, author = {Gennady A. Noskov and Alexander N. Rybalov}, title = {Generic case complexity of the Graph Isomorphism Problem}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {1}, pages = {9--20}, year = {2016}, url = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0008/gcc-2016-0008.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/NoskovR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Pueschel16, author = {Kristen Pueschel}, title = {Hydra group doubles are not residually finite}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {2}, pages = {163--170}, year = {2016}, url = {https://doi.org/10.1515/gcc-2016-0015}, doi = {10.1515/GCC-2016-0015}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Pueschel16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Romankov16, author = {Vitalii Roman'kov}, title = {A nonlinear decomposition attack}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {2}, pages = {197--207}, year = {2016}, url = {https://doi.org/10.1515/gcc-2016-0017}, doi = {10.1515/GCC-2016-0017}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Romankov16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Schridde16, author = {Christian Schridde}, title = {Computing discrete logarithms using {\unicode{119978}}((log q)2) operations from \{+, -, {\texttimes}, {\(\div\)}, {\&}\}}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {2}, pages = {91--107}, year = {2016}, url = {https://doi.org/10.1515/gcc-2016-0009}, doi = {10.1515/GCC-2016-0009}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Schridde16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Shevlyakov16, author = {Artem N. Shevlyakov}, title = {On irreducible algebraic sets over linearly ordered semilattices}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {2}, pages = {187--195}, year = {2016}, url = {https://doi.org/10.1515/gcc-2016-0014}, doi = {10.1515/GCC-2016-0014}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Shevlyakov16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/ShpilrainS16, author = {Vladimir Shpilrain and Bianca Sosnovski}, title = {Compositions of linear functions and applications to hashing}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {2}, pages = {155--161}, year = {2016}, url = {https://doi.org/10.1515/gcc-2016-0016}, doi = {10.1515/GCC-2016-0016}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/ShpilrainS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Ushakov16, author = {Alexander Ushakov}, title = {Authenticated commutator key agreement protocol}, journal = {Groups Complex. Cryptol.}, volume = {8}, number = {2}, pages = {127--133}, year = {2016}, url = {https://doi.org/10.1515/gcc-2016-0011}, doi = {10.1515/GCC-2016-0011}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gcc/Ushakov16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/AtchisonT15, author = {Benjamin Atchison and Edward C. Turner}, title = {Symmetries of finite graphs and homology}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {1}, pages = {11--30}, year = {2015}, url = {https://doi.org/10.1515/gcc-2015-0003}, doi = {10.1515/GCC-2015-0003}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/AtchisonT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Bacardit15, author = {Llu{\'{\i}}s Bacardit}, title = {A combinatorial algorithm to compute presentations of mapping class groups of orientable surfaces with one boundary component}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {2}, pages = {95--115}, year = {2015}, url = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0011/gcc-2015-0011.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Bacardit15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/BegelforMV15, author = {Evgeni Begelfor and Stephen D. Miller and Ramarathnam Venkatesan}, title = {Non-abelian analogs of lattice rounding}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {2}, pages = {117--133}, year = {2015}, url = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0010/gcc-2015-0010.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/BegelforMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/ChauvetM15, author = {Jean{-}Marie Chauvet and Eric Mahe}, title = {Key agreement under tropical parallels}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {2}, pages = {195--198}, year = {2015}, url = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0013/gcc-2015-0013.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/ChauvetM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Das15, author = {Manik Lal Das}, title = {Key-escrow free multi-signature scheme using bilinear pairings}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {1}, pages = {47--57}, year = {2015}, url = {https://doi.org/10.1515/gcc-2015-0002}, doi = {10.1515/GCC-2015-0002}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Das15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/DistlerE15, author = {Andreas Distler and Bettina Eick}, title = {Group extensions with special properties}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {1}, pages = {1--10}, year = {2015}, url = {https://doi.org/10.1515/gcc-2015-0005}, doi = {10.1515/GCC-2015-0005}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/DistlerE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/GaglioneLS15, author = {Anthony M. Gaglione and Seymour Lipschutz and Dennis Spellman}, title = {An application of elementary real analysis to a metabelian group admitting integral polynomial exponents}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {1}, pages = {59--68}, year = {2015}, url = {https://doi.org/10.1515/gcc-2015-0004}, doi = {10.1515/GCC-2015-0004}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/GaglioneLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/HartHMM15, author = {Sarah Hart and Ivo Hedtke and Matthias M{\"{u}}ller{-}Hannemann and Sandeep Murthy}, title = {A fast search algorithm for {\unicode{12296}}m, m, m{\unicode{12297}} Triple Product Property triples and an application for 5{\texttimes}5 matrix multiplication}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {1}, pages = {31--46}, year = {2015}, url = {https://doi.org/10.1515/gcc-2015-0001}, doi = {10.1515/GCC-2015-0001}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/HartHMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Ivachev15, author = {Artyom S. Ivachev}, title = {On transitive differentiable modulo pn functions}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {2}, pages = {183--190}, year = {2015}, url = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0014/gcc-2015-0014.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Ivachev15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/MonicoN15, author = {Chris Monico and Mara D. Neusel}, title = {Cryptanalysis of a system using matrices over group rings}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {2}, pages = {175--182}, year = {2015}, url = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0008/gcc-2015-0008.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/MonicoN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/MyasnikovR15, author = {Alexei G. Myasnikov and Vitalii Roman'kov}, title = {A linear decomposition attack}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {1}, pages = {81--94}, year = {2015}, url = {https://doi.org/10.1515/gcc-2015-0007}, doi = {10.1515/GCC-2015-0007}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/MyasnikovR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Orevkov15, author = {Stepan Yu. Orevkov}, title = {Algorithmic recognition of quasipositive 4-braids of algebraic length three}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {2}, pages = {157--173}, year = {2015}, url = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0012/gcc-2015-0012.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Orevkov15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Romankov15, author = {Vitalii Roman'kov}, title = {New probabilistic public-key encryption based on the {RSA} cryptosystem}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {2}, pages = {153--156}, year = {2015}, url = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0016/gcc-2015-0016.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Romankov15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Rybalov15, author = {Alexander N. Rybalov}, title = {On the generic complexity of the searching graph isomorphism problem}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {2}, pages = {191--193}, year = {2015}, url = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0015/gcc-2015-0015.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Rybalov15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Sahattchieve15, author = {Jordan Sahattchieve}, title = {On convex hulls and the quasiconvex subgroups of Fm{\texttimes}{\(\mathbb{Z}\)}n}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {1}, pages = {69--80}, year = {2015}, url = {https://doi.org/10.1515/gcc-2015-0006}, doi = {10.1515/GCC-2015-0006}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Sahattchieve15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/TabackY15, author = {Jennifer Taback and Sharif Younes}, title = {Tree-based language complexity of Thompson's group {F}}, journal = {Groups Complex. Cryptol.}, volume = {7}, number = {2}, pages = {135--152}, year = {2015}, url = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0009/gcc-2015-0009.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/TabackY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/BabinkostovaBCMS14, author = {Liljana Babinkostova and Kevin W. Bombardier and Matthew C. Cole and Thomas A. Morrell and Cory B. Scott}, title = {Algebraic properties of generalized Rijndael-like ciphers}, journal = {Groups Complex. Cryptol.}, volume = {6}, number = {1}, pages = {37--54}, year = {2014}, url = {https://doi.org/10.1515/gcc-2014-0004}, doi = {10.1515/GCC-2014-0004}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/BabinkostovaBCMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Brough14, author = {Tara Brough}, title = {Groups with poly-context-free word problem}, journal = {Groups Complex. Cryptol.}, volume = {6}, number = {1}, pages = {9--29}, year = {2014}, url = {https://doi.org/10.1515/gcc-2014-0002}, doi = {10.1515/GCC-2014-0002}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Brough14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Chiodo14, author = {Maurice Chiodo}, title = {On torsion in finitely presented groups}, journal = {Groups Complex. Cryptol.}, volume = {6}, number = {1}, pages = {1--8}, year = {2014}, url = {https://doi.org/10.1515/gcc-2014-0001}, doi = {10.1515/GCC-2014-0001}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Chiodo14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/FineGRS14, author = {Benjamin Fine and Anthony M. Gaglione and Gerhard Rosenberger and Dennis Spellman}, title = {Reflections on some aspects of infinite groups}, journal = {Groups Complex. Cryptol.}, volume = {6}, number = {2}, pages = {81--91}, year = {2014}, url = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-0008/gcc-2014-0008.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/FineGRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Gilman14, author = {Robert H. Gilman}, title = {Generalized small cancellation presentations for automatic groups}, journal = {Groups Complex. Cryptol.}, volume = {6}, number = {2}, pages = {93--101}, year = {2014}, url = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-0007/gcc-2014-0007.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Gilman14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/KharlampovichMS14, author = {Olga Kharlampovich and Alexei G. Myasnikov and Denis E. Serbin}, title = {Infinite words and universal free actions}, journal = {Groups Complex. Cryptol.}, volume = {6}, number = {1}, pages = {55--69}, year = {2014}, url = {https://doi.org/10.1515/gcc-2014-0005}, doi = {10.1515/GCC-2014-0005}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/KharlampovichMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Miller14, author = {Charles F. Miller III}, title = {Friends and relatives of BS(1, 2)}, journal = {Groups Complex. Cryptol.}, volume = {6}, number = {2}, pages = {73--80}, year = {2014}, url = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-0006/gcc-2014-0006.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Miller14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/MyasnikovR14, author = {Alexei G. Myasnikov and Vitalii Roman'kov}, title = {Diophantine cryptography in free metabelian groups: Theoretical base}, journal = {Groups Complex. Cryptol.}, volume = {6}, number = {2}, pages = {103--120}, year = {2014}, url = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-0011/gcc-2014-0011.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/MyasnikovR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/MyasnikovU14, author = {Alexey D. Myasnikov and Alexander Ushakov}, title = {Quantum algorithm for discrete logarithm problem for matrices over finite group rings}, journal = {Groups Complex. Cryptol.}, volume = {6}, number = {1}, pages = {31--36}, year = {2014}, url = {https://doi.org/10.1515/gcc-2014-0003}, doi = {10.1515/GCC-2014-0003}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gcc/MyasnikovU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/RileyS14, author = {Tim R. Riley and Andrew W. Sale}, title = {Palindromic width of wreath products, metabelian groups, and max-n solvable groups}, journal = {Groups Complex. Cryptol.}, volume = {6}, number = {2}, pages = {121--132}, year = {2014}, url = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-0009/gcc-2014-0009.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/RileyS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Shpilrain14, author = {Vladimir Shpilrain}, title = {Editorial}, journal = {Groups Complex. Cryptol.}, volume = {6}, number = {2}, pages = {71}, year = {2014}, url = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-5001/gcc-2014-5001.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Shpilrain14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Shpilrain14a, author = {Vladimir Shpilrain}, title = {Decoy-based information security}, journal = {Groups Complex. Cryptol.}, volume = {6}, number = {2}, pages = {149--155}, year = {2014}, url = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-0010/gcc-2014-0010.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Shpilrain14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Ventura14, author = {Enric Ventura}, title = {Group-theoretic orbit decidability}, journal = {Groups Complex. Cryptol.}, volume = {6}, number = {2}, pages = {133--148}, year = {2014}, url = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-0012/gcc-2014-0012.xml}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Ventura14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Anokhin13, author = {Mikhail Anokhin}, title = {Constructing a pseudo-free family of finite computational groups under the general integer factoring intractability assumption}, journal = {Groups Complex. Cryptol.}, volume = {5}, number = {1}, pages = {53--74}, year = {2013}, url = {https://doi.org/10.1515/gcc-2013-0003}, doi = {10.1515/GCC-2013-0003}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Anokhin13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/ConnorL13, author = {Thomas Connor and Dimitri Leemans}, title = {A new algorithm to find apartments in coset geometries}, journal = {Groups Complex. Cryptol.}, volume = {5}, number = {1}, pages = {75--89}, year = {2013}, url = {https://doi.org/10.1515/gcc-2013-0006}, doi = {10.1515/GCC-2013-0006}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/ConnorL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/FineMR13, author = {Benjamin Fine and Anja I. S. Moldenhauer and Gerhard Rosenberger}, title = {A secret sharing scheme based on the Closest Vector Theorem and a modification to a private key cryptosystem}, journal = {Groups Complex. Cryptol.}, volume = {5}, number = {2}, pages = {223--238}, year = {2013}, url = {https://doi.org/10.1515/gcc-2013-0012}, doi = {10.1515/GCC-2013-0012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/FineMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/FineR13, author = {Benjamin Fine and Gerhard Rosenberger}, title = {Faithful representations of limit groups {II}}, journal = {Groups Complex. Cryptol.}, volume = {5}, number = {1}, pages = {91--96}, year = {2013}, url = {https://doi.org/10.1515/gcc-2013-0005}, doi = {10.1515/GCC-2013-0005}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/FineR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/GrigorievS13, author = {Dima Grigoriev and Vladimir Shpilrain}, title = {Secrecy without one-way functions}, journal = {Groups Complex. Cryptol.}, volume = {5}, number = {1}, pages = {31--52}, year = {2013}, url = {https://doi.org/10.1515/gcc-2013-0002}, doi = {10.1515/GCC-2013-0002}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/GrigorievS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/HabeebK13, author = {Maggie E. Habeeb and Delaram Kahrobaei}, title = {On the dimension of matrix representations of finitely generated torsion free nilpotent groups}, journal = {Groups Complex. Cryptol.}, volume = {5}, number = {2}, pages = {193--209}, year = {2013}, url = {https://doi.org/10.1515/gcc-2013-0011}, doi = {10.1515/GCC-2013-0011}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gcc/HabeebK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/HoltR13, author = {Derek F. Holt and Sarah Rees}, title = {Shortlex automaticity and geodesic regularity in Artin groups}, journal = {Groups Complex. Cryptol.}, volume = {5}, number = {1}, pages = {1--23}, year = {2013}, url = {https://doi.org/10.1515/gcc-2013-0001}, doi = {10.1515/GCC-2013-0001}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/HoltR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/KahrobaeiKS13, author = {Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain}, title = {Public key exchange using matrices over group rings}, journal = {Groups Complex. Cryptol.}, volume = {5}, number = {1}, pages = {97--115}, year = {2013}, url = {https://doi.org/10.1515/gcc-2013-0007}, doi = {10.1515/GCC-2013-0007}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/KahrobaeiKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/KalkaT13, author = {Arkadius G. Kalka and Mina Teicher}, title = {Non-associative key establishment for left distributive systems}, journal = {Groups Complex. Cryptol.}, volume = {5}, number = {2}, pages = {169--191}, year = {2013}, url = {https://doi.org/10.1515/gcc-2013-0009}, doi = {10.1515/GCC-2013-0009}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/KalkaT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/KoblitzM13, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at non-uniformity}, journal = {Groups Complex. Cryptol.}, volume = {5}, number = {2}, pages = {117--139}, year = {2013}, url = {https://doi.org/10.1515/gcc-2013-0008}, doi = {10.1515/GCC-2013-0008}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/KoblitzM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Krammer13, author = {Daan Krammer}, title = {An asymmetric generalisation of Artin monoids}, journal = {Groups Complex. Cryptol.}, volume = {5}, number = {2}, pages = {141--167}, year = {2013}, url = {https://doi.org/10.1515/gcc-2013-0010}, doi = {10.1515/GCC-2013-0010}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Krammer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Rosenmann13, author = {Amnon Rosenmann}, title = {On the intersection of subgroups in free groups: Echelon subgroups are inert}, journal = {Groups Complex. Cryptol.}, volume = {5}, number = {2}, pages = {211--221}, year = {2013}, url = {https://doi.org/10.1515/gcc-2013-0013}, doi = {10.1515/GCC-2013-0013}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Rosenmann13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Rybalov13, author = {Alexander N. Rybalov}, title = {Generic complexity of the Diophantine problem}, journal = {Groups Complex. Cryptol.}, volume = {5}, number = {1}, pages = {25--30}, year = {2013}, url = {https://doi.org/10.1515/gcc-2013-0004}, doi = {10.1515/GCC-2013-0004}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Rybalov13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/CravenJ12, author = {Matthew J. Craven and Henri C. Jimbo}, title = {Evolutionary algorithm solution of the multiple conjugacy search problem in groups, and its applications to cryptography}, journal = {Groups Complex. Cryptol.}, volume = {4}, number = {1}, pages = {135--165}, year = {2012}, url = {https://doi.org/10.1515/gcc-2012-0002}, doi = {10.1515/GCC-2012-0002}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gcc/CravenJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/DiekertDM12, author = {Volker Diekert and Andrew J. Duncan and Alexei G. Myasnikov}, title = {Cyclic rewriting and conjugacy problems}, journal = {Groups Complex. Cryptol.}, volume = {4}, number = {2}, pages = {321--355}, year = {2012}, url = {https://doi.org/10.1515/gcc-2012-0020}, doi = {10.1515/GCC-2012-0020}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/DiekertDM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Eftekhari12, author = {Mohammad Eftekhari}, title = {A Diffie-Hellman key exchange protocol using matrices over noncommutative rings}, journal = {Groups Complex. Cryptol.}, volume = {4}, number = {1}, pages = {167--176}, year = {2012}, url = {https://doi.org/10.1515/gcc-2012-0001}, doi = {10.1515/GCC-2012-0001}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Eftekhari12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/ElderRW12, author = {Murray Elder and Andrew Rechnitzer and Thomas Wong}, title = {On the cogrowth of Thompson's group {F}}, journal = {Groups Complex. Cryptol.}, volume = {4}, number = {2}, pages = {301--320}, year = {2012}, url = {https://doi.org/10.1515/gcc-2012-0018}, doi = {10.1515/GCC-2012-0018}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/ElderRW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/GrigorievN12, author = {Dima Grigoriev and Sergey I. Nikolenko}, title = {Continuous hard-to-invert functions and biometric authentication}, journal = {Groups Complex. Cryptol.}, volume = {4}, number = {1}, pages = {19--32}, year = {2012}, url = {https://doi.org/10.1515/gcc-2012-0004}, doi = {10.1515/GCC-2012-0004}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/GrigorievN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/GrigorievS12, author = {Dima Grigoriev and Vladimir Shpilrain}, title = {No-leak authentication by the Sherlock Holmes method}, journal = {Groups Complex. Cryptol.}, volume = {4}, number = {1}, pages = {177--189}, year = {2012}, url = {https://doi.org/10.1515/gcc-2012-0009}, doi = {10.1515/GCC-2012-0009}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/GrigorievS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/HedtkeM12, author = {Ivo Hedtke and Sandeep Murthy}, title = {Search and test algorithms for triple product property triples}, journal = {Groups Complex. Cryptol.}, volume = {4}, number = {1}, pages = {111--133}, year = {2012}, url = {https://doi.org/10.1515/gcc-2012-0006}, doi = {10.1515/GCC-2012-0006}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/HedtkeM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Ibrahim12, author = {Fedaa Ibrahim}, title = {Cylinders, multi-cylinders and the induced action of Aut(Fn)}, journal = {Groups Complex. Cryptol.}, volume = {4}, number = {2}, pages = {357--375}, year = {2012}, url = {https://doi.org/10.1515/gcc-2012-0017}, doi = {10.1515/GCC-2012-0017}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Ibrahim12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/KahrobaeiK12, author = {Delaram Kahrobaei and Charalambos Koupparis}, title = {Non-commutative digital signatures}, journal = {Groups Complex. Cryptol.}, volume = {4}, number = {2}, pages = {377--384}, year = {2012}, url = {https://doi.org/10.1515/gcc-2012-0019}, doi = {10.1515/GCC-2012-0019}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/KahrobaeiK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/LewisW12, author = {Mark L. Lewis and James B. Wilson}, title = {Isomorphism in expanding families of indistinguishable groups}, journal = {Groups Complex. Cryptol.}, volume = {4}, number = {1}, pages = {73--110}, year = {2012}, url = {https://doi.org/10.1515/gcc-2012-0008}, doi = {10.1515/GCC-2012-0008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/LewisW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Lohrey12, author = {Markus Lohrey}, title = {Algorithmics on SLP-compressed strings: {A} survey}, journal = {Groups Complex. Cryptol.}, volume = {4}, number = {2}, pages = {241--299}, year = {2012}, url = {https://doi.org/10.1515/gcc-2012-0016}, doi = {10.1515/GCC-2012-0016}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Lohrey12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Neupane12, author = {Kashi Neupane}, title = {Two-party key establishment: From passive to active security without introducing new assumptions}, journal = {Groups Complex. Cryptol.}, volume = {4}, number = {1}, pages = {1--17}, year = {2012}, url = {https://doi.org/10.1515/gcc-2012-0005}, doi = {10.1515/GCC-2012-0005}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Neupane12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Romankov12, author = {Vitalii Roman'kov}, title = {Equations over groups}, journal = {Groups Complex. Cryptol.}, volume = {4}, number = {2}, pages = {191--239}, year = {2012}, url = {https://doi.org/10.1515/gcc-2012-0015}, doi = {10.1515/GCC-2012-0015}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Romankov12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Wilson12, author = {James B. Wilson}, title = {Existence, algorithms, and asymptotics of direct product decompositions, {I}}, journal = {Groups Complex. Cryptol.}, volume = {4}, number = {1}, pages = {33--72}, year = {2012}, url = {https://doi.org/10.1515/gcc-2012-0007}, doi = {10.1515/GCC-2012-0007}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Wilson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Antolin11, author = {Yago Antol{\'{\i}}n}, title = {On Cayley graphs of virtually free groups}, journal = {Groups Complex. Cryptol.}, volume = {3}, number = {2}, pages = {301--327}, year = {2011}, url = {https://doi.org/10.1515/gcc.2011.012}, doi = {10.1515/GCC.2011.012}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Antolin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/BacarditD11, author = {Llu{\'{\i}}s Bacardit and Warren Dicks}, title = {The Zieschang-McCool method for generating algebraic mapping-class groups}, journal = {Groups Complex. Cryptol.}, volume = {3}, number = {2}, pages = {187--220}, year = {2011}, url = {https://doi.org/10.1515/gcc.2011.007}, doi = {10.1515/GCC.2011.007}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/BacarditD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/BonanomeM11, author = {Marianna Bonanome and Stephen Majewicz}, title = {Quantum algorithms for fixed points and invariant subgroups}, journal = {Groups Complex. Cryptol.}, volume = {3}, number = {2}, pages = {329--348}, year = {2011}, url = {https://doi.org/10.1515/gcc.2011.013}, doi = {10.1515/GCC.2011.013}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/BonanomeM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Bremner11, author = {Murray R. Bremner}, title = {How to compute the Wedderburn decomposition of a finite-dimensional associative algebra}, journal = {Groups Complex. Cryptol.}, volume = {3}, number = {1}, pages = {47--66}, year = {2011}, url = {https://doi.org/10.1515/gcc.2011.003}, doi = {10.1515/GCC.2011.003}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Bremner11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/CarboneCR11, author = {Lisa Carbone and Leigh Cobbs and Gabriel Rosenberg}, title = {Tree lattice subgroups}, journal = {Groups Complex. Cryptol.}, volume = {3}, number = {1}, pages = {1--23}, year = {2011}, url = {https://doi.org/10.1515/gcc.2011.001}, doi = {10.1515/GCC.2011.001}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/CarboneCR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/FalconerFK11, author = {Kenneth J. Falconer and Benjamin Fine and Delaram Kahrobaei}, title = {Growth rate of an endomorphism of a group}, journal = {Groups Complex. Cryptol.}, volume = {3}, number = {2}, pages = {285--300}, year = {2011}, url = {https://doi.org/10.1515/gcc.2011.011}, doi = {10.1515/GCC.2011.011}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/FalconerFK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/FineR11, author = {Benjamin Fine and Gerhard Rosenberger}, title = {A note on faithful representations of limit groups}, journal = {Groups Complex. Cryptol.}, volume = {3}, number = {2}, pages = {349--355}, year = {2011}, url = {https://doi.org/10.1515/gcc.2011.014}, doi = {10.1515/GCC.2011.014}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/FineR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/GilmanMR11, author = {Robert H. Gilman and Alexei G. Myasnikov and Vitalii Roman'kov}, title = {Random equations in free groups}, journal = {Groups Complex. Cryptol.}, volume = {3}, number = {2}, pages = {257--284}, year = {2011}, url = {https://doi.org/10.1515/gcc.2011.010}, doi = {10.1515/GCC.2011.010}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/GilmanMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Miller11, author = {Russell Miller}, title = {An introduction to computable model theory on groups and fields}, journal = {Groups Complex. Cryptol.}, volume = {3}, number = {1}, pages = {25--45}, year = {2011}, url = {https://doi.org/10.1515/gcc.2011.002}, doi = {10.1515/GCC.2011.002}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Miller11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/MosinaU11, author = {Natalia Mosina and Alexander Ushakov}, title = {Strong law of large numbers on graphs and groups}, journal = {Groups Complex. Cryptol.}, volume = {3}, number = {1}, pages = {67--103}, year = {2011}, url = {https://doi.org/10.1515/gcc.2011.004}, doi = {10.1515/GCC.2011.004}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gcc/MosinaU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/MyasnikovU11, author = {Alexei G. Myasnikov and Alexander Ushakov}, title = {Random van Kampen diagrams and algorithmic problems in groups}, journal = {Groups Complex. Cryptol.}, volume = {3}, number = {1}, pages = {121--185}, year = {2011}, url = {https://doi.org/10.1515/gcc.2011.006}, doi = {10.1515/GCC.2011.006}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/MyasnikovU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/SeberryTT11, author = {Jennifer Seberry and Vinhbuu To and Dongvu Tonien}, title = {A new generic digital signature algorithm}, journal = {Groups Complex. Cryptol.}, volume = {3}, number = {2}, pages = {221--237}, year = {2011}, url = {https://doi.org/10.1515/gcc.2011.008}, doi = {10.1515/GCC.2011.008}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/SeberryTT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Vassileva11, author = {Svetla Vassileva}, title = {Polynomial time conjugacy in wreath products and free solvable groups}, journal = {Groups Complex. Cryptol.}, volume = {3}, number = {1}, pages = {105--120}, year = {2011}, url = {https://doi.org/10.1515/gcc.2011.005}, doi = {10.1515/GCC.2011.005}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Vassileva11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Wassink11, author = {Bronlyn Wassink}, title = {Subgroups of R. Thompson's group {F} that are isomorphic to {F}}, journal = {Groups Complex. Cryptol.}, volume = {3}, number = {2}, pages = {239--256}, year = {2011}, url = {https://doi.org/10.1515/gcc.2011.009}, doi = {10.1515/GCC.2011.009}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Wassink11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/AmirG10, author = {Gideon Amir and Ori Gurel{-}Gurevich}, title = {The diameter of a random Cayley graph of {\(\mathbb{Z}\)} q}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {1}, pages = {59--65}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.004}, doi = {10.1515/GCC.2010.004}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/AmirG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/BaumslagBFT10, author = {Gilbert Baumslag and Yegor Bryukhov and Benjamin Fine and Douglas Troeger}, title = {Challenge response password security using combinatorial group theory}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {1}, pages = {67--81}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.005}, doi = {10.1515/GCC.2010.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/BaumslagBFT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/CarstensenFR10, author = {Celine Carstensen and Benjamin Fine and Gerhard Rosenberger}, title = {On asymptotic densities and generic properties in finitely generated groups}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {2}, pages = {113--121}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.008}, doi = {10.1515/GCC.2010.008}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/CarstensenFR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/ChumZ10, author = {Chi Sing Chum and Xiaowen Zhang}, title = {The Latin squares and the secret sharing schemes}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {2}, pages = {175--202}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.011}, doi = {10.1515/GCC.2010.011}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/ChumZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Conder10, author = {Marston D. E. Conder}, title = {An update on Hurwitz groups}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {1}, pages = {35--49}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.002}, doi = {10.1515/GCC.2010.002}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Conder10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/ElderR10, author = {Murray Elder and Andrew Rechnitzer}, title = {Some geodesic problems in groups}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {2}, pages = {223--229}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.014}, doi = {10.1515/GCC.2010.014}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/ElderR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Ito10, author = {Tetsuya Ito}, title = {On finite Thurston-type orderings of braid groups}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {2}, pages = {123--155}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.009}, doi = {10.1515/GCC.2010.009}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Ito10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/JovanovicK10, author = {Philipp Jovanovic and Martin Kreuzer}, title = {Algebraic attacks using SAT-solvers}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {2}, pages = {247--259}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.016}, doi = {10.1515/GCC.2010.016}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/JovanovicK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/KalkaLT10, author = {Arkadius G. Kalka and Eran Liberman and Mina Teicher}, title = {Subgroup conjugacy problem for Garside subgroups of Garside groups}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {2}, pages = {157--174}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.010}, doi = {10.1515/GCC.2010.010}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/KalkaLT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Kassabov10, author = {Martin Kassabov}, title = {Presentations of matrix rings}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {1}, pages = {51--57}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.003}, doi = {10.1515/GCC.2010.003}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Kassabov10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Kron10, author = {Bernhard Kr{\"{o}}n}, title = {Cutting up graphs revisited - a short proof of Stallings' structure theorem}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {2}, pages = {213--221}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.013}, doi = {10.1515/GCC.2010.013}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Kron10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Mahalanobis10, author = {Ayan Mahalanobis}, title = {The discrete logarithm problem in the group of non-singular circulant matrices}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {1}, pages = {83--89}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.006}, doi = {10.1515/GCC.2010.006}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Mahalanobis10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Neumann-BrosigR10, author = {Matthias Neumann{-}Brosig and Gerhard Rosenberger}, title = {A note on the homology of hyperbolic groups}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {2}, pages = {203--212}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.012}, doi = {10.1515/GCC.2010.012}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Neumann-BrosigR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Shevlyakov10, author = {Artem N. Shevlyakov}, title = {Algebraic geometry over natural numbers. The classification of coordinate monoids}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {1}, pages = {91--111}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.007}, doi = {10.1515/GCC.2010.007}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Shevlyakov10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Shpilrain10, author = {Vladimir Shpilrain}, title = {Search and witness problems in group theory}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {2}, pages = {231--246}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.015}, doi = {10.1515/GCC.2010.015}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Shpilrain10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Weiss10, author = {Uri Weiss}, title = {On Shephard groups with large triangles}, journal = {Groups Complex. Cryptol.}, volume = {2}, number = {1}, pages = {1--34}, year = {2010}, url = {https://doi.org/10.1515/gcc.2010.001}, doi = {10.1515/GCC.2010.001}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Weiss10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/BacarditD09, author = {Llu{\'{\i}}s Bacardit and Warren Dicks}, title = {Actions of the Braid Group, and New Algebraic Proofs of Results of Dehornoy and Larue}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {1}, pages = {77--129}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.77}, doi = {10.1515/GCC.2009.77}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/BacarditD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Chouraqui09, author = {Fabienne Chouraqui}, title = {Rewriting Systems and Embedding of Monoids in Groups}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {1}, pages = {131--140}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.131}, doi = {10.1515/GCC.2009.131}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Chouraqui09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Clement09, author = {Anthony E. Clement}, title = {Torsion-free Abelian Factor Groups of the Baumslag-Solitar Groups and Subgroups of the Additive Group of the Rational Numbers}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {2}, pages = {165--168}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.165}, doi = {10.1515/GCC.2009.165}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Clement09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Dean09, author = {Margaret H. Dean}, title = {Metabelian Product of a Free Nilpotent Group with a Free Abelian Group}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {2}, pages = {169--180}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.169}, doi = {10.1515/GCC.2009.169}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Dean09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/FineMR09, author = {Benjamin Fine and Alexei G. Myasnikov and Gerhard Rosenberger}, title = {Generic Subgroups of Group Amalgams}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {1}, pages = {51--61}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.51}, doi = {10.1515/GCC.2009.51}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/FineMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/GaglioneLS09, author = {Anthony M. Gaglione and Seymour Lipschutz and Dennis Spellman}, title = {Almost Locally Free Groups and a Theorem of Magnus: Some Questions}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {2}, pages = {181--198}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.181}, doi = {10.1515/GCC.2009.181}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/GaglioneLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/GrigorievHP09, author = {Dima Grigoriev and Edward A. Hirsch and Konstantin Pervyshev}, title = {A Complete Public-Key Cryptosystem}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {1}, pages = {1--12}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.1}, doi = {10.1515/GCC.2009.1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/GrigorievHP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/GrigorievS09, author = {Dima Grigoriev and Vladimir Shpilrain}, title = {Authentication from Matrix Conjugation}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {2}, pages = {199--205}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.199}, doi = {10.1515/GCC.2009.199}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/GrigorievS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/KahrobaeiA09, author = {Delaram Kahrobaei and Michael Anshel}, title = {Decision and Search in Non-Abelian Cramer-Shoup Public Key Cryptosystem}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {2}, pages = {217--225}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.217}, doi = {10.1515/GCC.2009.217}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/KahrobaeiA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/KalkaLT09, author = {Arkadius G. Kalka and Eran Liberman and Mina Teicher}, title = {A Note on the Shifted Conjugacy Problem in Braid Groups}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {2}, pages = {227--230}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.227}, doi = {10.1515/GCC.2009.227}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/KalkaLT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Kreuzer09, author = {Martin Kreuzer}, title = {Algebraic Attacks Galore!}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {2}, pages = {231--259}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.231}, doi = {10.1515/GCC.2009.231}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Kreuzer09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/LakinT09, author = {Stephen R. Lakin and Richard M. Thomas}, title = {Space Complexity and Word Problems of Groups}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {2}, pages = {261--273}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.261}, doi = {10.1515/GCC.2009.261}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/LakinT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/LongriggU09, author = {Jonathan Longrigg and Alexander Ushakov}, title = {A Practical Attack on a Certain Braid Group Based Shifted Conjugacy Authentication Protocol}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {2}, pages = {275--286}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.275}, doi = {10.1515/GCC.2009.275}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gcc/LongriggU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Maclachlan09, author = {Colin Maclachlan}, title = {Existence and Non-Existence of Torsion in Maximal Arithmetic Fuchsian Groups}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {2}, pages = {287--295}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.287}, doi = {10.1515/GCC.2009.287}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Maclachlan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/MajewiczZ09, author = {Stephen Majewicz and Marcos Zyman}, title = {Power-Commutative Nilpotent R-Powered Groups}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {2}, pages = {297--309}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.297}, doi = {10.1515/GCC.2009.297}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/MajewiczZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Myasnikov09, author = {Alex D. Myasnikov}, title = {Generic Case Complexity and One-Way Functions}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {1}, pages = {13--31}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.13}, doi = {10.1515/GCC.2009.13}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Myasnikov09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/MyasnikovU09, author = {Alex D. Myasnikov and Alexander Ushakov}, title = {Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux Key Agreement Protocol}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {1}, pages = {63--75}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.63}, doi = {10.1515/GCC.2009.63}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gcc/MyasnikovU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Osin09, author = {Denis Osin}, title = {On the Universal Theory of Torsion and Lacunary Hyperbolic Groups}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {2}, pages = {311--319}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.311}, doi = {10.1515/GCC.2009.311}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Osin09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/RebelHR09, author = {Volkmar gro{\ss}e Rebel and Miriam Hahn and Gerhard Rosenberger}, title = {The Tits Alternative for Tsaranov's Generalized Tetrahedron Groups}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {2}, pages = {207--216}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.207}, doi = {10.1515/GCC.2009.207}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/RebelHR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/Shnaps09, author = {Daniella Bak Shnaps}, title = {The Word and Conjugacy Problem for Shuffle Groups}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {2}, pages = {143--164}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.143}, doi = {10.1515/GCC.2009.143}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/Shnaps09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gcc/ShpilrainZ09, author = {Vladimir Shpilrain and Gabriel Zapata}, title = {Using Decision Problems in Public Key Cryptography}, journal = {Groups Complex. Cryptol.}, volume = {1}, number = {1}, pages = {33--49}, year = {2009}, url = {https://doi.org/10.1515/GCC.2009.33}, doi = {10.1515/GCC.2009.33}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gcc/ShpilrainZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.