Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Soft Decision Decoding in Mud Pulse Telemetry System., , , and . VTC Spring, page 1-5. IEEE, (2020)Analysis of a key exchange protocol based on tropical matrix algebra., and . J. Math. Cryptol., 12 (3): 137-141 (2018)Authenticated commutator key agreement protocol.. Groups Complex. Cryptol., 8 (2): 127-133 (2016)Complexity of Spherical Equations in Finite Groups., , and . SOFSEM, volume 14519 of Lecture Notes in Computer Science, page 383-397. Springer, (2024)A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols., , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 37-43. Springer, (2014)Thompson's Group and Public Key Cryptography., and . ACNS, volume 3531 of Lecture Notes in Computer Science, page 151-163. (2005)Knapsack Problems in Groups., , and . CoRR, (2013)Analysis of a certain polycyclic-group-based cryptosystem., and . J. Math. Cryptol., 9 (3): 161-167 (2015)Search problems in groups and branching processes., and . Int. J. Algebra Comput., 25 (3): 445-480 (2015)Cryptanalysis of the shifted conjugacy authentication protocol., and . J. Math. Cryptol., 2 (2): 109-116 (2008)