1 | -- | 8 | Matvei Kotov, Dmitry Panteleev, Alexander Ushakov. Analysis of secret sharing schemes based on Nielsen transformations |
9 | -- | 15 | Meng-Che Ho. The word problem of ℤ n is a multiple context-free language |
17 | -- | 27 | Alexey Gribov, Delaram Kahrobaei, Vladimir Shpilrain. Practical private-key fully homomorphic encryption in rings |
29 | -- | 32 | Mohammad Hossein Ghaffari, Zohreh Mostaghim. More secure version of a Cayley hash function |
33 | -- | 41 | Marek Kaluba, Piotr W. Nowak. Certifying numerical estimates of spectral gaps |
43 | -- | 52 | Benjamin Fine, Anthony M. Gaglione, Gerhard Rosenberger, Dennis Spellman. Orderable groups, elementary theory, and the Kaplansky conjecture |