Journal: Groups Complexity Cryptology

Volume 4, Issue 2

191 -- 239Vitalii Roman'kov. Equations over groups
241 -- 299Markus Lohrey. Algorithmics on SLP-compressed strings: A survey
301 -- 320Murray Elder, Andrew Rechnitzer, Thomas Wong. On the cogrowth of Thompson's group F
321 -- 355Volker Diekert, Andrew J. Duncan, Alexei G. Myasnikov. Cyclic rewriting and conjugacy problems
357 -- 375Fedaa Ibrahim. Cylinders, multi-cylinders and the induced action of Aut(Fn)
377 -- 384Delaram Kahrobaei, Charalambos Koupparis. Non-commutative digital signatures

Volume 4, Issue 1

1 -- 17Kashi Neupane. Two-party key establishment: From passive to active security without introducing new assumptions
19 -- 32Dima Grigoriev, Sergey I. Nikolenko. Continuous hard-to-invert functions and biometric authentication
33 -- 72James B. Wilson. Existence, algorithms, and asymptotics of direct product decompositions, I
73 -- 110Mark L. Lewis, James B. Wilson. Isomorphism in expanding families of indistinguishable groups
111 -- 133Ivo Hedtke, Sandeep Murthy. Search and test algorithms for triple product property triples
135 -- 165Matthew J. Craven, Henri C. Jimbo. Evolutionary algorithm solution of the multiple conjugacy search problem in groups, and its applications to cryptography
167 -- 176Mohammad Eftekhari. A Diffie-Hellman key exchange protocol using matrices over noncommutative rings
177 -- 189Dima Grigoriev, Vladimir Shpilrain. No-leak authentication by the Sherlock Holmes method