Publication | Date of Publication | Type |
---|
Complexity of Spherical Equations in Finite Groups | 2023-08-24 | Paper |
Algebraic and quantum attacks on two digital signature schemes | 2023-03-09 | Paper |
Attack on Kayawood protocol: uncloaking private keys | 2021-06-17 | Paper |
Orientable quadratic equations in free metabelian groups | 2021-06-03 | Paper |
On subset sum problem in branch groups | 2020-06-04 | Paper |
Conjugacy search problem and the Andrews-Curtis conjecture | 2020-03-13 | Paper |
An attack on the Walnut digital signature algorithm | 2019-09-12 | Paper |
Analysis of a key exchange protocol based on tropical matrix algebra | 2018-10-04 | Paper |
Analysis of secret sharing schemes based on Nielsen transformations | 2018-06-27 | Paper |
Orientable quadratic equations in free metabelian groups | 2018-04-16 | Paper |
Magnus embedding and algorithmic properties of groups 𝐹/𝑁^{(𝑑)} | 2017-06-14 | Paper |
Random presentations and random subgroups: a survey | 2017-02-07 | Paper |
Authenticated commutator key agreement protocol | 2016-11-07 | Paper |
Conjugacy search problem and the Andrews-Curtis conjecture | 2016-09-01 | Paper |
Generic case completeness | 2016-08-04 | Paper |
Quadratic equations in the Grigorchuk group. | 2016-03-18 | Paper |
Spherical quadratic equations in free metabelian groups | 2016-03-03 | Paper |
Analysis of a certain polycyclic-group-based cryptosystem | 2015-10-13 | Paper |
Search problems in groups and branching processes | 2015-05-29 | Paper |
Algorithmic theory of free solvable groups: randomized computations. | 2014-08-28 | Paper |
Quantum algorithm for discrete logarithm problem for matrices over finite group rings | 2014-07-02 | Paper |
Cryptanalysis of matrix conjugation schemes | 2014-06-30 | Paper |
EFFICIENT ALGORITHMS FOR HIGHLY COMPRESSED DATA: THE WORD PROBLEM IN HIGMAN'S GROUP IS IN P | 2013-01-30 | Paper |
POWER CIRCUITS, EXPONENTIAL ALGEBRA, AND TIME COMPLEXITY | 2012-11-22 | Paper |
Efficient algorithms for highly compressed data: The Word Problem in Higman's group is in P | 2012-08-23 | Paper |
Strong law of large numbers on graphs and groups | 2012-05-07 | Paper |
Random van Kampen diagrams and algorithmic problems in groups | 2012-05-07 | Paper |
The word problem in the Baumslag group with a non-elementary Dehn function is polynomial time decidable. | 2012-04-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q3101433 | 2011-11-29 | Paper |
The conjugacy problem in the Grigorchuk group is polynomial time decidable. | 2011-04-21 | Paper |
Mean-set attack: cryptanalysis of Sibert et al. authentication protocol | 2010-11-12 | Paper |
The word and geodesic problems in free solvable groups | 2010-09-27 | Paper |
A Practical Attack on a Certain Braid Group Based Shifted Conjugacy Authentication Protocol | 2010-03-11 | Paper |
Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux Key Agreement Protocol | 2009-03-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q3545328 | 2008-12-10 | Paper |
Cryptanalysis of the shifted conjugacy authentication protocol | 2008-11-07 | Paper |
Random subgroups and analysis of the length-based and quotient attacks | 2008-08-11 | Paper |
Group-based cryptography | 2008-05-29 | Paper |
A Practical Attack on a Braid Group Based Cryptographic Protocol | 2008-03-17 | Paper |
Thompson’s Group and Public Key Cryptography | 2007-09-24 | Paper |
Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol | 2007-09-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q3442582 | 2007-05-18 | Paper |
Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
The conjugacy search problem in public key cryptography: unnecessary and insufficient | 2006-10-25 | Paper |
Quadratic equations in the lamplighter group | 0001-01-03 | Paper |
Constrained inhomogeneous spherical equations: average-case hardness | 0001-01-03 | Paper |