default search action
Groups Complexity Cryptology, Volume 2
Volume 2, Number 1, June 2010
- Uri Weiss:
On Shephard groups with large triangles. 1-34 - Marston D. E. Conder:
An update on Hurwitz groups. 35-49 - Martin Kassabov:
Presentations of matrix rings. 51-57 - Gideon Amir, Ori Gurel-Gurevich:
The diameter of a random Cayley graph of ℤ q. 59-65 - Gilbert Baumslag, Yegor Bryukhov, Benjamin Fine, Douglas Troeger:
Challenge response password security using combinatorial group theory. 67-81 - Ayan Mahalanobis:
The discrete logarithm problem in the group of non-singular circulant matrices. 83-89 - Artem N. Shevlyakov:
Algebraic geometry over natural numbers. The classification of coordinate monoids. 91-111
Volume 2, Number 2, December 2010
- Celine Carstensen, Benjamin Fine, Gerhard Rosenberger:
On asymptotic densities and generic properties in finitely generated groups. 113-121 - Tetsuya Ito:
On finite Thurston-type orderings of braid groups. 123-155 - Arkadius G. Kalka, Eran Liberman, Mina Teicher:
Subgroup conjugacy problem for Garside subgroups of Garside groups. 157-174 - Chi Sing Chum, Xiaowen Zhang:
The Latin squares and the secret sharing schemes. 175-202 - Matthias Neumann-Brosig, Gerhard Rosenberger:
A note on the homology of hyperbolic groups. 203-212 - Bernhard Krön:
Cutting up graphs revisited - a short proof of Stallings' structure theorem. 213-221 - Murray Elder, Andrew Rechnitzer:
Some geodesic problems in groups. 223-229 - Vladimir Shpilrain:
Search and witness problems in group theory. 231-246 - Philipp Jovanovic, Martin Kreuzer:
Algebraic attacks using SAT-solvers. 247-259
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.