Journal: Groups Complexity Cryptology

Volume 4, Issue 1

1 -- 17Kashi Neupane. Two-party key establishment: From passive to active security without introducing new assumptions
19 -- 32Dima Grigoriev, Sergey I. Nikolenko. Continuous hard-to-invert functions and biometric authentication
33 -- 72James B. Wilson. Existence, algorithms, and asymptotics of direct product decompositions, I
73 -- 110Mark L. Lewis, James B. Wilson. Isomorphism in expanding families of indistinguishable groups
111 -- 133Ivo Hedtke, Sandeep Murthy. Search and test algorithms for triple product property triples
135 -- 165Matthew J. Craven, Henri C. Jimbo. Evolutionary algorithm solution of the multiple conjugacy search problem in groups, and its applications to cryptography
167 -- 176Mohammad Eftekhari. A Diffie-Hellman key exchange protocol using matrices over noncommutative rings
177 -- 189Dima Grigoriev, Vladimir Shpilrain. No-leak authentication by the Sherlock Holmes method