| Publication | Date of Publication | Type |
|---|
Constrained inhomogeneous spherical equations: average-case hardness Journal of Groups, Complexity, Cryptology | 2024-09-10 | Paper |
On subset sum problem in branch groups Journal of Groups, Complexity, Cryptology | 2024-07-03 | Paper |
Complexity of Spherical Equations in Finite Groups | 2023-08-24 | Paper |
Algebraic and quantum attacks on two digital signature schemes Journal of Mathematical Cryptology | 2023-03-09 | Paper |
Attack on Kayawood protocol: uncloaking private keys Journal of Mathematical Cryptology | 2021-06-17 | Paper |
Orientable quadratic equations in free metabelian groups Journal of Algebra | 2021-06-03 | Paper |
On subset sum problem in branch groups | 2020-06-04 | Paper |
Conjugacy search problem and the Andrews-Curtis conjecture Groups - Complexity - Cryptology | 2020-03-13 | Paper |
An attack on the Walnut digital signature algorithm Designs, Codes and Cryptography | 2019-09-12 | Paper |
Analysis of a key exchange protocol based on tropical matrix algebra Journal of Mathematical Cryptology | 2018-10-04 | Paper |
Analysis of secret sharing schemes based on Nielsen transformations Groups - Complexity - Cryptology | 2018-06-27 | Paper |
Orientable quadratic equations in free metabelian groups | 2018-04-16 | Paper |
Magnus embedding and algorithmic properties of groups \(F/N^{(d)}\) Transactions of the American Mathematical Society | 2017-06-14 | Paper |
Random presentations and random subgroups: a survey | 2017-02-07 | Paper |
Authenticated commutator key agreement protocol Groups - Complexity - Cryptology | 2016-11-07 | Paper |
Conjugacy search problem and the Andrews-Curtis conjecture | 2016-09-01 | Paper |
Generic case completeness Journal of Computer and System Sciences | 2016-08-04 | Paper |
Non-commutative lattice problems Journal of Group Theory | 2016-05-19 | Paper |
Quadratic equations in the Grigorchuk group. Groups, Geometry, and Dynamics | 2016-03-18 | Paper |
Spherical quadratic equations in free metabelian groups. Proceedings of the American Mathematical Society | 2016-03-03 | Paper |
Analysis of a certain polycyclic-group-based cryptosystem Journal of Mathematical Cryptology | 2015-10-13 | Paper |
Search problems in groups and branching processes. International Journal of Algebra and Computation | 2015-05-29 | Paper |
Algorithmic theory of free solvable groups: randomized computations. Journal of Algebra | 2014-08-28 | Paper |
Quantum algorithm for discrete logarithm problem for matrices over finite group rings Groups - Complexity - Cryptology | 2014-07-02 | Paper |
Cryptanalysis of matrix conjugation schemes Journal of Mathematical Cryptology | 2014-06-30 | Paper |
Efficient algorithms for highly compressed data: the word problem in Higman's group is in P. International Journal of Algebra and Computation | 2013-01-30 | Paper |
Power circuits, exponential algebra, and time complexity International Journal of Algebra and Computation | 2012-11-22 | Paper |
Efficient algorithms for highly compressed data: the word problem in Higman's group is in P | 2012-08-23 | Paper |
Strong law of large numbers on graphs and groups Groups, Complexity, Cryptology | 2012-05-07 | Paper |
Random van Kampen diagrams and algorithmic problems in groups. Groups, Complexity, Cryptology | 2012-05-07 | Paper |
The word problem in the Baumslag group with a non-elementary Dehn function is polynomial time decidable. Journal of Algebra | 2012-04-10 | Paper |
scientific article; zbMATH DE number 5982274 (Why is no real title available?) | 2011-11-29 | Paper |
The conjugacy problem in the Grigorchuk group is polynomial time decidable. Groups, Geometry, and Dynamics | 2011-04-21 | Paper |
Mean-set attack: cryptanalysis of Sibert et al. authentication protocol Journal of Mathematical Cryptology | 2010-11-12 | Paper |
The word and geodesic problems in free solvable groups. Transactions of the American Mathematical Society | 2010-09-27 | Paper |
A practical attack on a certain braid group based shifted conjugacy authentication protocol Groups - Complexity - Cryptology | 2010-03-11 | Paper |
Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux Key Agreement Protocol Groups - Complexity - Cryptology | 2009-03-23 | Paper |
A new key exchange protocol based on the decomposition problem | 2008-12-10 | Paper |
Cryptanalysis of the shifted conjugacy authentication protocol Journal of Mathematical Cryptology | 2008-11-07 | Paper |
Random subgroups and analysis of the length-based and quotient attacks Journal of Mathematical Cryptology | 2008-08-11 | Paper |
Group-based cryptography Advanced Courses in Mathematics -- CRM Barcelona | 2008-05-29 | Paper |
A Practical Attack on a Braid Group Based Cryptographic Protocol Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
Thompson’s Group and Public Key Cryptography Applied Cryptography and Network Security | 2007-09-24 | Paper |
Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Quotient tests and Gröbner bases. | 2007-05-18 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
The conjugacy search problem in public key cryptography: unnecessary and insufficient Applicable Algebra in Engineering, Communication and Computing | 2006-10-25 | Paper |
Quadratic equations in the lamplighter group | N/A | Paper |
Constrained inhomogeneous spherical equations: average-case hardness | N/A | Paper |