Search dblp for Publications

export results for "stream:streams/journals/gcc:"

 download as .bib file

@article{DBLP:journals/gcc/Anokhin19,
  author    = {Mikhail Anokhin},
  title     = {Constructing a pseudo-freefamily of finite computational groups under
               the generalinteger factoring intractability assumption},
  journal   = {Groups Complex. Cryptol.},
  volume    = {11},
  number    = {2},
  pages     = {133--134},
  year      = {2019},
  url       = {https://doi.org/10.1515/gcc-2019-2009},
  doi       = {10.1515/gcc-2019-2009},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Anokhin19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/GrigorchukG19,
  author    = {Rostislav I. Grigorchuk and
               Dima Grigoriev},
  title     = {Key agreement based on automaton groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {11},
  number    = {2},
  pages     = {77--81},
  year      = {2019},
  url       = {https://doi.org/10.1515/gcc-2019-2012},
  doi       = {10.1515/gcc-2019-2012},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/GrigorchukG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/KahrobaeiM19,
  author    = {Delaram Kahrobaei and
               Keivan Mallahi Karai},
  title     = {Some applications of arithmetic groups in cryptography},
  journal   = {Groups Complex. Cryptol.},
  volume    = {11},
  number    = {1},
  pages     = {25--33},
  year      = {2019},
  url       = {https://doi.org/10.1515/gcc-2019-2002},
  doi       = {10.1515/gcc-2019-2002},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/KahrobaeiM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/KharlampovichMT19,
  author    = {Olga Kharlampovich and
               Alexei G. Myasnikov and
               Alexander Taam},
  title     = {Effective construction of covers of canonical Hom-diagrams for equations
               over torsion-free hyperbolic groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {11},
  number    = {2},
  pages     = {83--101},
  year      = {2019},
  url       = {https://doi.org/10.1515/gcc-2019-2010},
  doi       = {10.1515/gcc-2019-2010},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/KharlampovichMT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/KrophollerS19,
  author    = {Robert P. Kropholler and
               Davide Spriano},
  title     = {Closure properties in the class of multiple context-free groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {11},
  number    = {1},
  pages     = {1--15},
  year      = {2019},
  url       = {https://doi.org/10.1515/gcc-2019-2004},
  doi       = {10.1515/gcc-2019-2004},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/KrophollerS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Monico19,
  author    = {Chris Monico},
  title     = {Cryptanalysis of a hash function, and the modular subset sum problem},
  journal   = {Groups Complex. Cryptol.},
  volume    = {11},
  number    = {1},
  pages     = {17--23},
  year      = {2019},
  url       = {https://doi.org/10.1515/gcc-2019-2001},
  doi       = {10.1515/gcc-2019-2001},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Monico19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/PanteleevU19,
  author    = {Dmitry Panteleev and
               Alexander Ushakov},
  title     = {Conjugacy search problem and the Andrews-Curtis conjecture},
  journal   = {Groups Complex. Cryptol.},
  volume    = {11},
  number    = {1},
  pages     = {43--60},
  year      = {2019},
  url       = {https://doi.org/10.1515/gcc-2019-2005},
  doi       = {10.1515/gcc-2019-2005},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/PanteleevU19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/PramanikA19,
  author    = {Jyotirmoy Pramanik and
               Avishek Adhikari},
  title     = {Ramp secret sharing with cheater identification in presence of rushing
               cheaters},
  journal   = {Groups Complex. Cryptol.},
  volume    = {11},
  number    = {2},
  pages     = {103--113},
  year      = {2019},
  url       = {https://doi.org/10.1515/gcc-2019-2006},
  doi       = {10.1515/gcc-2019-2006},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/PramanikA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Romankov19,
  author    = {Vitalii Roman'kov},
  title     = {An improved version of the {AAG} cryptographic protocol},
  journal   = {Groups Complex. Cryptol.},
  volume    = {11},
  number    = {1},
  pages     = {35--41},
  year      = {2019},
  url       = {https://doi.org/10.1515/gcc-2019-2003},
  doi       = {10.1515/gcc-2019-2003},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Romankov19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/SchleimerW19,
  author    = {Saul Schleimer and
               Bert Wiest},
  title     = {Garside theory and subsurfaces: Some examples in braid groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {11},
  number    = {2},
  pages     = {61--75},
  year      = {2019},
  url       = {https://doi.org/10.1515/gcc-2019-2007},
  doi       = {10.1515/gcc-2019-2007},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/SchleimerW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/ShamsabadDR19,
  author    = {Mohammad Reza Mirzaee Shamsabad and
               Seyed Mojtaba Dehnavi and
               Akbar Mahmoodi Rishakani},
  title     = {Randomized nonlinear software-oriented {MDS} diffusion layers},
  journal   = {Groups Complex. Cryptol.},
  volume    = {11},
  number    = {2},
  pages     = {123--131},
  year      = {2019},
  url       = {https://doi.org/10.1515/gcc-2019-2011},
  doi       = {10.1515/gcc-2019-2011},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/ShamsabadDR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Shevlyakov19,
  author    = {Artem N. Shevlyakov},
  title     = {On group automorphisms in universal algebraic geometry},
  journal   = {Groups Complex. Cryptol.},
  volume    = {11},
  number    = {2},
  pages     = {115--121},
  year      = {2019},
  url       = {https://doi.org/10.1515/gcc-2019-2008},
  doi       = {10.1515/gcc-2019-2008},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Shevlyakov19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Anokhin18,
  author    = {Mikhail Anokhin},
  title     = {A certain family of subgroups of {\(\mathbb{Z}\)}\({}_{\mbox{n}}\)\({}^{\mbox{*}}\)
               is weakly pseudo-free under the general integer factoring intractability
               assumption},
  journal   = {Groups Complex. Cryptol.},
  volume    = {10},
  number    = {2},
  pages     = {99--110},
  year      = {2018},
  url       = {https://doi.org/10.1515/gcc-2018-0007},
  doi       = {10.1515/gcc-2018-0007},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Anokhin18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Asboei18,
  author    = {Alireza Khalili Asboei},
  title     = {Recognition of 2-dimensional projective linear groups by the group
               order and the set of numbers of its elements of each order},
  journal   = {Groups Complex. Cryptol.},
  volume    = {10},
  number    = {2},
  pages     = {111--118},
  year      = {2018},
  url       = {https://doi.org/10.1515/gcc-2018-0011},
  doi       = {10.1515/gcc-2018-0011},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Asboei18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/FineGRS18,
  author    = {Benjamin Fine and
               Anthony M. Gaglione and
               Gerhard Rosenberger and
               Dennis Spellman},
  title     = {Orderable groups, elementary theory, and the Kaplansky conjecture},
  journal   = {Groups Complex. Cryptol.},
  volume    = {10},
  number    = {1},
  pages     = {43--52},
  year      = {2018},
  url       = {https://doi.org/10.1515/gcc-2018-0005},
  doi       = {10.1515/gcc-2018-0005},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/FineGRS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/GhaffariM18,
  author    = {Mohammad Hossein Ghaffari and
               Zohreh Mostaghim},
  title     = {More secure version of a Cayley hash function},
  journal   = {Groups Complex. Cryptol.},
  volume    = {10},
  number    = {1},
  pages     = {29--32},
  year      = {2018},
  url       = {https://doi.org/10.1515/gcc-2018-0002},
  doi       = {10.1515/gcc-2018-0002},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/GhaffariM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/GilmanKS18,
  author    = {Robert H. Gilman and
               Robert P. Kropholler and
               Saul Schleimer},
  title     = {Groups whose word problems are not semilinear},
  journal   = {Groups Complex. Cryptol.},
  volume    = {10},
  number    = {2},
  pages     = {53--62},
  year      = {2018},
  url       = {https://doi.org/10.1515/gcc-2018-0010},
  doi       = {10.1515/gcc-2018-0010},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/GilmanKS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/GribovKS18,
  author    = {Alexey Gribov and
               Delaram Kahrobaei and
               Vladimir Shpilrain},
  title     = {Practical private-key fully homomorphic encryption in rings},
  journal   = {Groups Complex. Cryptol.},
  volume    = {10},
  number    = {1},
  pages     = {17--27},
  year      = {2018},
  url       = {https://doi.org/10.1515/gcc-2018-0006},
  doi       = {10.1515/gcc-2018-0006},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/GribovKS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Ho18,
  author    = {Meng{-}Che Ho},
  title     = {The word problem of {\(\mathbb{Z}\)} n is a multiple context-free
               language},
  journal   = {Groups Complex. Cryptol.},
  volume    = {10},
  number    = {1},
  pages     = {9--15},
  year      = {2018},
  url       = {https://doi.org/10.1515/gcc-2018-0003},
  doi       = {10.1515/gcc-2018-0003},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Ho18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/KalubaN18,
  author    = {Marek Kaluba and
               Piotr W. Nowak},
  title     = {Certifying numerical estimates of spectral gaps},
  journal   = {Groups Complex. Cryptol.},
  volume    = {10},
  number    = {1},
  pages     = {33--41},
  year      = {2018},
  url       = {https://doi.org/10.1515/gcc-2018-0004},
  doi       = {10.1515/gcc-2018-0004},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/KalubaN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/KotovPU18,
  author    = {Matvei Kotov and
               Dmitry Panteleev and
               Alexander Ushakov},
  title     = {Analysis of secret sharing schemes based on Nielsen transformations},
  journal   = {Groups Complex. Cryptol.},
  volume    = {10},
  number    = {1},
  pages     = {1--8},
  year      = {2018},
  url       = {https://doi.org/10.1515/gcc-2018-0001},
  doi       = {10.1515/gcc-2018-0001},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/KotovPU18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Romankov18,
  author    = {Vitaly Roman'kov},
  title     = {Two general schemes of algebraic cryptography},
  journal   = {Groups Complex. Cryptol.},
  volume    = {10},
  number    = {2},
  pages     = {83--98},
  year      = {2018},
  url       = {https://doi.org/10.1515/gcc-2018-0009},
  doi       = {10.1515/gcc-2018-0009},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Romankov18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/SilvaZ18,
  author    = {Pedro V. Silva and
               Alexander Zakharov},
  title     = {On finitely generated submonoids of virtually free groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {10},
  number    = {2},
  pages     = {63--82},
  year      = {2018},
  url       = {https://doi.org/10.1515/gcc-2018-0008},
  doi       = {10.1515/gcc-2018-0008},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/SilvaZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Anokhin17,
  author    = {Mikhail Anokhin},
  title     = {Pseudo-free families of finite computationalelementary abelian p-groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {9},
  number    = {1},
  pages     = {1},
  year      = {2017},
  url       = {https://doi.org/10.1515/gcc-2017-0001},
  doi       = {10.1515/gcc-2017-0001},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Anokhin17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Button17,
  author    = {Jack O. Button},
  title     = {Free by cyclic groups and linear groups with restricted unipotent
               elements},
  journal   = {Groups Complex. Cryptol.},
  volume    = {9},
  number    = {2},
  pages     = {137--149},
  year      = {2017},
  url       = {https://doi.org/10.1515/gcc-2017-0009},
  doi       = {10.1515/gcc-2017-0009},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Button17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/ChauvetM17,
  author    = {Jean{-}Marie Chauvet and
               Eric Mahe},
  title     = {Cryptography from the tropical Hessian pencil},
  journal   = {Groups Complex. Cryptol.},
  volume    = {9},
  number    = {1},
  pages     = {19},
  year      = {2017},
  url       = {https://doi.org/10.1515/gcc-2017-0002},
  doi       = {10.1515/gcc-2017-0002},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/ChauvetM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/EickE17,
  author    = {Bettina Eick and
               Ann{-}Kristin Engel},
  title     = {The isomorphism problem for torsion free nilpotent groups of Hirsch
               length at most 5},
  journal   = {Groups Complex. Cryptol.},
  volume    = {9},
  number    = {1},
  pages     = {55},
  year      = {2017},
  url       = {https://doi.org/10.1515/gcc-2017-0004},
  doi       = {10.1515/gcc-2017-0004},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/EickE17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Friedl17,
  author    = {Stefan Friedl},
  title     = {An elementary proof of the group law for elliptic curves},
  journal   = {Groups Complex. Cryptol.},
  volume    = {9},
  number    = {2},
  pages     = {117--123},
  year      = {2017},
  url       = {https://doi.org/10.1515/gcc-2017-0010},
  doi       = {10.1515/gcc-2017-0010},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Friedl17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/GarretaMO17,
  author    = {Albert Garreta and
               Alexei Miasnikov and
               Denis Ovchinnikov},
  title     = {Random nilpotent groups, polycyclic presentations, and Diophantine
               problems},
  journal   = {Groups Complex. Cryptol.},
  volume    = {9},
  number    = {2},
  pages     = {99--115},
  year      = {2017},
  url       = {https://doi.org/10.1515/gcc-2017-0007},
  doi       = {10.1515/gcc-2017-0007},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/GarretaMO17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/MarkoZJ17,
  author    = {Frantisek Marko and
               Alexandr N. Zubkov and
               Martin Jur{\'{a}}s},
  title     = {Public-key cryptosystem based on invariants of diagonalizable groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {9},
  number    = {1},
  pages     = {31},
  year      = {2017},
  url       = {https://doi.org/10.1515/gcc-2017-0003},
  doi       = {10.1515/gcc-2017-0003},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/MarkoZJ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/MiasnikovV17,
  author    = {Alexei Miasnikov and
               Svetla Vassileva},
  title     = {Log-space conjugacy problem in the Grigorchuk group},
  journal   = {Groups Complex. Cryptol.},
  volume    = {9},
  number    = {1},
  pages     = {77},
  year      = {2017},
  url       = {https://doi.org/10.1515/gcc-2017-0005},
  doi       = {10.1515/gcc-2017-0005},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/MiasnikovV17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/MishchenkoT17,
  author    = {Alexei Mishchenko and
               Alexander Treier},
  title     = {Knapsack problem for nilpotent groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {9},
  number    = {1},
  pages     = {87},
  year      = {2017},
  url       = {https://doi.org/10.1515/gcc-2017-0006},
  doi       = {10.1515/gcc-2017-0006},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/MishchenkoT17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Romankov17,
  author    = {Vitalii Roman'kov},
  title     = {Cryptanalysis of a combinatorial public key cryptosystem},
  journal   = {Groups Complex. Cryptol.},
  volume    = {9},
  number    = {2},
  pages     = {125--135},
  year      = {2017},
  url       = {https://doi.org/10.1515/gcc-2017-0013},
  doi       = {10.1515/gcc-2017-0013},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Romankov17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Rybalov17,
  author    = {Alexander N. Rybalov},
  title     = {Generic hardness of the Boolean satisfiability problem},
  journal   = {Groups Complex. Cryptol.},
  volume    = {9},
  number    = {2},
  pages     = {151--154},
  year      = {2017},
  url       = {https://doi.org/10.1515/gcc-2017-0008},
  doi       = {10.1515/gcc-2017-0008},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Rybalov17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/ShahryariS17,
  author    = {Mohammad Shahryari and
               Artem N. Shevlyakov},
  title     = {Direct products, varieties, and compactness conditions},
  journal   = {Groups Complex. Cryptol.},
  volume    = {9},
  number    = {2},
  pages     = {159--166},
  year      = {2017},
  url       = {https://doi.org/10.1515/gcc-2017-0011},
  doi       = {10.1515/gcc-2017-0011},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/ShahryariS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Timoshenko17,
  author    = {Evgeny I. Timoshenko},
  title     = {A remark on spherical equations in free metabelian groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {9},
  number    = {2},
  pages     = {155--158},
  year      = {2017},
  url       = {https://doi.org/10.1515/gcc-2017-0012},
  doi       = {10.1515/gcc-2017-0012},
  timestamp = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Timoshenko17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/AkchicheK16,
  author    = {Omar Akchiche and
               Omar Khadir},
  title     = {Factoring multi-power {RSA} moduli with primes sharing least or most
               significant bits},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {1},
  pages     = {47--54},
  year      = {2016},
  url       = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0002/gcc-2016-0002.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/AkchicheK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/AnshelAGG16,
  author    = {Iris Anshel and
               Derek Atkins and
               Dorian Goldfeld and
               Paul E. Gunnells},
  title     = {A class of hash functions based on the algebraic eraser{\texttrademark}},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {1},
  pages     = {1--7},
  year      = {2016},
  url       = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0004/gcc-2016-0004.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/AnshelAGG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/BlaneyN16,
  author    = {Kenneth R. Blaney and
               Andrey Nikolaev},
  title     = {A {PTIME} solution to the restricted conjugacy problem in generalized
               Heisenberg groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {1},
  pages     = {69--74},
  year      = {2016},
  url       = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0003/gcc-2016-0003.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/BlaneyN16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/CravenR16,
  author    = {Matthew J. Craven and
               Daniel Robertz},
  title     = {A parallel evolutionary approach to solving systems of equations in
               polycyclic groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {2},
  pages     = {109--125},
  year      = {2016},
  url       = {https://doi.org/10.1515/gcc-2016-0012},
  doi       = {10.1515/gcc-2016-0012},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/CravenR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/DuquesneG16,
  author    = {Sylvain Duquesne and
               Loubna Ghammam},
  title     = {Memory-saving computation of the pairing final exponentiation on {BN}
               curves},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {1},
  pages     = {75--90},
  year      = {2016},
  url       = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0006/gcc-2016-0006.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/DuquesneG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Eick16,
  author    = {Bettina Eick},
  title     = {The automorphism group of a finitely generated virtually abelian group},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {1},
  pages     = {35--45},
  year      = {2016},
  url       = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0007/gcc-2016-0007.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Eick16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/ElderT16,
  author    = {Murray Elder and
               Jennifer Taback},
  title     = {Thompson's group {F} is 1-counter graph automatic},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {1},
  pages     = {21--33},
  year      = {2016},
  url       = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0001/gcc-2016-0001.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/ElderT16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/FouotsaC16,
  author    = {Emmanuel Fouotsa and
               Abdoul Aziz Ciss},
  title     = {Faster Ate pairing computation on Selmer's model of elliptic curves},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {1},
  pages     = {55--67},
  year      = {2016},
  url       = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0005/gcc-2016-0005.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/FouotsaC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/GryakK16,
  author    = {Jonathan Gryak and
               Delaram Kahrobaei},
  title     = {The status of polycyclic group-based cryptography: {A} survey and
               open problems},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {2},
  pages     = {171--186},
  year      = {2016},
  url       = {https://doi.org/10.1515/gcc-2016-0013},
  doi       = {10.1515/gcc-2016-0013},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/GryakK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/KappeNS16,
  author    = {Luise{-}Charlotte Kappe and
               Daniela Nikolova{-}Popova and
               Eric Swartz},
  title     = {On the covering number of small symmetric groups and some sporadic
               simple groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {2},
  pages     = {135--154},
  year      = {2016},
  url       = {https://doi.org/10.1515/gcc-2016-0010},
  doi       = {10.1515/gcc-2016-0010},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/KappeNS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/NoskovR16,
  author    = {Gennady A. Noskov and
               Alexander N. Rybalov},
  title     = {Generic case complexity of the Graph Isomorphism Problem},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {1},
  pages     = {9--20},
  year      = {2016},
  url       = {http://www.degruyter.com/view/j/gcc.2016.8.issue-1/gcc-2016-0008/gcc-2016-0008.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/NoskovR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Pueschel16,
  author    = {Kristen Pueschel},
  title     = {Hydra group doubles are not residually finite},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {2},
  pages     = {163--170},
  year      = {2016},
  url       = {https://doi.org/10.1515/gcc-2016-0015},
  doi       = {10.1515/gcc-2016-0015},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Pueschel16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Romankov16,
  author    = {Vitalii Roman'kov},
  title     = {A nonlinear decomposition attack},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {2},
  pages     = {197--207},
  year      = {2016},
  url       = {https://doi.org/10.1515/gcc-2016-0017},
  doi       = {10.1515/gcc-2016-0017},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Romankov16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Schridde16,
  author    = {Christian Schridde},
  title     = {Computing discrete logarithms using {\unicode{119978}}((log q)2) operations
               from \{+, -, {\texttimes}, {\(\div\)}, {\&}\}},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {2},
  pages     = {91--107},
  year      = {2016},
  url       = {https://doi.org/10.1515/gcc-2016-0009},
  doi       = {10.1515/gcc-2016-0009},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Schridde16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Shevlyakov16,
  author    = {Artem N. Shevlyakov},
  title     = {On irreducible algebraic sets over linearly ordered semilattices},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {2},
  pages     = {187--195},
  year      = {2016},
  url       = {https://doi.org/10.1515/gcc-2016-0014},
  doi       = {10.1515/gcc-2016-0014},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Shevlyakov16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/ShpilrainS16,
  author    = {Vladimir Shpilrain and
               Bianca Sosnovski},
  title     = {Compositions of linear functions and applications to hashing},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {2},
  pages     = {155--161},
  year      = {2016},
  url       = {https://doi.org/10.1515/gcc-2016-0016},
  doi       = {10.1515/gcc-2016-0016},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/ShpilrainS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Ushakov16,
  author    = {Alexander Ushakov},
  title     = {Authenticated commutator key agreement protocol},
  journal   = {Groups Complex. Cryptol.},
  volume    = {8},
  number    = {2},
  pages     = {127--133},
  year      = {2016},
  url       = {https://doi.org/10.1515/gcc-2016-0011},
  doi       = {10.1515/gcc-2016-0011},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Ushakov16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/AtchisonT15,
  author    = {Benjamin Atchison and
               Edward C. Turner},
  title     = {Symmetries of finite graphs and homology},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {1},
  pages     = {11--30},
  year      = {2015},
  url       = {https://doi.org/10.1515/gcc-2015-0003},
  doi       = {10.1515/gcc-2015-0003},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/AtchisonT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Bacardit15,
  author    = {Llu{\'{\i}}s Bacardit},
  title     = {A combinatorial algorithm to compute presentations of mapping class
               groups of orientable surfaces with one boundary component},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {2},
  pages     = {95--115},
  year      = {2015},
  url       = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0011/gcc-2015-0011.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Bacardit15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/BegelforMV15,
  author    = {Evgeni Begelfor and
               Stephen D. Miller and
               Ramarathnam Venkatesan},
  title     = {Non-abelian analogs of lattice rounding},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {2},
  pages     = {117--133},
  year      = {2015},
  url       = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0010/gcc-2015-0010.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/BegelforMV15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/ChauvetM15,
  author    = {Jean{-}Marie Chauvet and
               Eric Mahe},
  title     = {Key agreement under tropical parallels},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {2},
  pages     = {195--198},
  year      = {2015},
  url       = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0013/gcc-2015-0013.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/ChauvetM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Das15,
  author    = {Manik Lal Das},
  title     = {Key-escrow free multi-signature scheme using bilinear pairings},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {1},
  pages     = {47--57},
  year      = {2015},
  url       = {https://doi.org/10.1515/gcc-2015-0002},
  doi       = {10.1515/gcc-2015-0002},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Das15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/DistlerE15,
  author    = {Andreas Distler and
               Bettina Eick},
  title     = {Group extensions with special properties},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {1},
  pages     = {1--10},
  year      = {2015},
  url       = {https://doi.org/10.1515/gcc-2015-0005},
  doi       = {10.1515/gcc-2015-0005},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/DistlerE15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/GaglioneLS15,
  author    = {Anthony M. Gaglione and
               Seymour Lipschutz and
               Dennis Spellman},
  title     = {An application of elementary real analysis to a metabelian group admitting
               integral polynomial exponents},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {1},
  pages     = {59--68},
  year      = {2015},
  url       = {https://doi.org/10.1515/gcc-2015-0004},
  doi       = {10.1515/gcc-2015-0004},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/GaglioneLS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/HartHMM15,
  author    = {Sarah Hart and
               Ivo Hedtke and
               Matthias M{\"{u}}ller{-}Hannemann and
               Sandeep Murthy},
  title     = {A fast search algorithm for {\unicode{12296}}m, m, m{\unicode{12297}}
               Triple Product Property triples and an application for 5{\texttimes}5
               matrix multiplication},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {1},
  pages     = {31--46},
  year      = {2015},
  url       = {https://doi.org/10.1515/gcc-2015-0001},
  doi       = {10.1515/gcc-2015-0001},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/HartHMM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Ivachev15,
  author    = {Artyom S. Ivachev},
  title     = {On transitive differentiable modulo pn functions},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {2},
  pages     = {183--190},
  year      = {2015},
  url       = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0014/gcc-2015-0014.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Ivachev15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/MonicoN15,
  author    = {Chris Monico and
               Mara D. Neusel},
  title     = {Cryptanalysis of a system using matrices over group rings},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {2},
  pages     = {175--182},
  year      = {2015},
  url       = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0008/gcc-2015-0008.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/MonicoN15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/MyasnikovR15,
  author    = {Alexei G. Myasnikov and
               Vitalii Roman'kov},
  title     = {A linear decomposition attack},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {1},
  pages     = {81--94},
  year      = {2015},
  url       = {https://doi.org/10.1515/gcc-2015-0007},
  doi       = {10.1515/gcc-2015-0007},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/MyasnikovR15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Orevkov15,
  author    = {Stepan Yu. Orevkov},
  title     = {Algorithmic recognition of quasipositive 4-braids of algebraic length
               three},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {2},
  pages     = {157--173},
  year      = {2015},
  url       = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0012/gcc-2015-0012.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Orevkov15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Romankov15,
  author    = {Vitalii Roman'kov},
  title     = {New probabilistic public-key encryption based on the {RSA} cryptosystem},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {2},
  pages     = {153--156},
  year      = {2015},
  url       = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0016/gcc-2015-0016.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Romankov15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Rybalov15,
  author    = {Alexander N. Rybalov},
  title     = {On the generic complexity of the searching graph isomorphism problem},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {2},
  pages     = {191--193},
  year      = {2015},
  url       = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0015/gcc-2015-0015.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Rybalov15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Sahattchieve15,
  author    = {Jordan Sahattchieve},
  title     = {On convex hulls and the quasiconvex subgroups of Fm{\texttimes}{\(\mathbb{Z}\)}n},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {1},
  pages     = {69--80},
  year      = {2015},
  url       = {https://doi.org/10.1515/gcc-2015-0006},
  doi       = {10.1515/gcc-2015-0006},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Sahattchieve15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/TabackY15,
  author    = {Jennifer Taback and
               Sharif Younes},
  title     = {Tree-based language complexity of Thompson's group {F}},
  journal   = {Groups Complex. Cryptol.},
  volume    = {7},
  number    = {2},
  pages     = {135--152},
  year      = {2015},
  url       = {http://www.degruyter.com/view/j/gcc.2015.7.issue-2/gcc-2015-0009/gcc-2015-0009.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/TabackY15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/BabinkostovaBCMS14,
  author    = {Liljana Babinkostova and
               Kevin W. Bombardier and
               Matthew C. Cole and
               Thomas A. Morrell and
               Cory B. Scott},
  title     = {Algebraic properties of generalized Rijndael-like ciphers},
  journal   = {Groups Complex. Cryptol.},
  volume    = {6},
  number    = {1},
  pages     = {37--54},
  year      = {2014},
  url       = {https://doi.org/10.1515/gcc-2014-0004},
  doi       = {10.1515/gcc-2014-0004},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/BabinkostovaBCMS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Brough14,
  author    = {Tara Brough},
  title     = {Groups with poly-context-free word problem},
  journal   = {Groups Complex. Cryptol.},
  volume    = {6},
  number    = {1},
  pages     = {9--29},
  year      = {2014},
  url       = {https://doi.org/10.1515/gcc-2014-0002},
  doi       = {10.1515/gcc-2014-0002},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Brough14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Chiodo14,
  author    = {Maurice Chiodo},
  title     = {On torsion in finitely presented groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {6},
  number    = {1},
  pages     = {1--8},
  year      = {2014},
  url       = {https://doi.org/10.1515/gcc-2014-0001},
  doi       = {10.1515/gcc-2014-0001},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Chiodo14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/FineGRS14,
  author    = {Benjamin Fine and
               Anthony M. Gaglione and
               Gerhard Rosenberger and
               Dennis Spellman},
  title     = {Reflections on some aspects of infinite groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {6},
  number    = {2},
  pages     = {81--91},
  year      = {2014},
  url       = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-0008/gcc-2014-0008.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/FineGRS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Gilman14,
  author    = {Robert H. Gilman},
  title     = {Generalized small cancellation presentations for automatic groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {6},
  number    = {2},
  pages     = {93--101},
  year      = {2014},
  url       = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-0007/gcc-2014-0007.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Gilman14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/KharlampovichMS14,
  author    = {Olga Kharlampovich and
               Alexei G. Myasnikov and
               Denis E. Serbin},
  title     = {Infinite words and universal free actions},
  journal   = {Groups Complex. Cryptol.},
  volume    = {6},
  number    = {1},
  pages     = {55--69},
  year      = {2014},
  url       = {https://doi.org/10.1515/gcc-2014-0005},
  doi       = {10.1515/gcc-2014-0005},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/KharlampovichMS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Miller14,
  author    = {Charles F. Miller III},
  title     = {Friends and relatives of BS(1, 2)},
  journal   = {Groups Complex. Cryptol.},
  volume    = {6},
  number    = {2},
  pages     = {73--80},
  year      = {2014},
  url       = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-0006/gcc-2014-0006.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Miller14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/MyasnikovR14,
  author    = {Alexei G. Myasnikov and
               Vitalii Roman'kov},
  title     = {Diophantine cryptography in free metabelian groups: Theoretical base},
  journal   = {Groups Complex. Cryptol.},
  volume    = {6},
  number    = {2},
  pages     = {103--120},
  year      = {2014},
  url       = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-0011/gcc-2014-0011.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/MyasnikovR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/MyasnikovU14,
  author    = {Alexey D. Myasnikov and
               Alexander Ushakov},
  title     = {Quantum algorithm for discrete logarithm problem for matrices over
               finite group rings},
  journal   = {Groups Complex. Cryptol.},
  volume    = {6},
  number    = {1},
  pages     = {31--36},
  year      = {2014},
  url       = {https://doi.org/10.1515/gcc-2014-0003},
  doi       = {10.1515/gcc-2014-0003},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/MyasnikovU14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/RileyS14,
  author    = {Tim R. Riley and
               Andrew W. Sale},
  title     = {Palindromic width of wreath products, metabelian groups, and max-n
               solvable groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {6},
  number    = {2},
  pages     = {121--132},
  year      = {2014},
  url       = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-0009/gcc-2014-0009.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/RileyS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Shpilrain14,
  author    = {Vladimir Shpilrain},
  title     = {Editorial},
  journal   = {Groups Complex. Cryptol.},
  volume    = {6},
  number    = {2},
  pages     = {71},
  year      = {2014},
  url       = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-5001/gcc-2014-5001.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Shpilrain14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Shpilrain14a,
  author    = {Vladimir Shpilrain},
  title     = {Decoy-based information security},
  journal   = {Groups Complex. Cryptol.},
  volume    = {6},
  number    = {2},
  pages     = {149--155},
  year      = {2014},
  url       = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-0010/gcc-2014-0010.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Shpilrain14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Ventura14,
  author    = {Enric Ventura},
  title     = {Group-theoretic orbit decidability},
  journal   = {Groups Complex. Cryptol.},
  volume    = {6},
  number    = {2},
  pages     = {133--148},
  year      = {2014},
  url       = {http://www.degruyter.com/view/j/gcc.2014.6.issue-2/gcc-2014-0012/gcc-2014-0012.xml},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Ventura14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Anokhin13,
  author    = {Mikhail Anokhin},
  title     = {Constructing a pseudo-free family of finite computational groups under
               the general integer factoring intractability assumption},
  journal   = {Groups Complex. Cryptol.},
  volume    = {5},
  number    = {1},
  pages     = {53--74},
  year      = {2013},
  url       = {https://doi.org/10.1515/gcc-2013-0003},
  doi       = {10.1515/gcc-2013-0003},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Anokhin13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/ConnorL13,
  author    = {Thomas Connor and
               Dimitri Leemans},
  title     = {A new algorithm to find apartments in coset geometries},
  journal   = {Groups Complex. Cryptol.},
  volume    = {5},
  number    = {1},
  pages     = {75--89},
  year      = {2013},
  url       = {https://doi.org/10.1515/gcc-2013-0006},
  doi       = {10.1515/gcc-2013-0006},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/ConnorL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/FineMR13,
  author    = {Benjamin Fine and
               Anja I. S. Moldenhauer and
               Gerhard Rosenberger},
  title     = {A secret sharing scheme based on the Closest Vector Theorem and a
               modification to a private key cryptosystem},
  journal   = {Groups Complex. Cryptol.},
  volume    = {5},
  number    = {2},
  pages     = {223--238},
  year      = {2013},
  url       = {https://doi.org/10.1515/gcc-2013-0012},
  doi       = {10.1515/gcc-2013-0012},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/FineMR13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/FineR13,
  author    = {Benjamin Fine and
               Gerhard Rosenberger},
  title     = {Faithful representations of limit groups {II}},
  journal   = {Groups Complex. Cryptol.},
  volume    = {5},
  number    = {1},
  pages     = {91--96},
  year      = {2013},
  url       = {https://doi.org/10.1515/gcc-2013-0005},
  doi       = {10.1515/gcc-2013-0005},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/FineR13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/GrigorievS13,
  author    = {Dima Grigoriev and
               Vladimir Shpilrain},
  title     = {Secrecy without one-way functions},
  journal   = {Groups Complex. Cryptol.},
  volume    = {5},
  number    = {1},
  pages     = {31--52},
  year      = {2013},
  url       = {https://doi.org/10.1515/gcc-2013-0002},
  doi       = {10.1515/gcc-2013-0002},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/GrigorievS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/HabeebK13,
  author    = {Maggie Habeeb and
               Delaram Kahrobaei},
  title     = {On the dimension of matrix representations of finitely generated torsion
               free nilpotent groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {5},
  number    = {2},
  pages     = {193--209},
  year      = {2013},
  url       = {https://doi.org/10.1515/gcc-2013-0011},
  doi       = {10.1515/gcc-2013-0011},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/HabeebK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/HoltR13,
  author    = {Derek F. Holt and
               Sarah Rees},
  title     = {Shortlex automaticity and geodesic regularity in Artin groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {5},
  number    = {1},
  pages     = {1--23},
  year      = {2013},
  url       = {https://doi.org/10.1515/gcc-2013-0001},
  doi       = {10.1515/gcc-2013-0001},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/HoltR13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/KahrobaeiKS13,
  author    = {Delaram Kahrobaei and
               Charalambos Koupparis and
               Vladimir Shpilrain},
  title     = {Public key exchange using matrices over group rings},
  journal   = {Groups Complex. Cryptol.},
  volume    = {5},
  number    = {1},
  pages     = {97--115},
  year      = {2013},
  url       = {https://doi.org/10.1515/gcc-2013-0007},
  doi       = {10.1515/gcc-2013-0007},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/KahrobaeiKS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/KalkaT13,
  author    = {Arkadius G. Kalka and
               Mina Teicher},
  title     = {Non-associative key establishment for left distributive systems},
  journal   = {Groups Complex. Cryptol.},
  volume    = {5},
  number    = {2},
  pages     = {169--191},
  year      = {2013},
  url       = {https://doi.org/10.1515/gcc-2013-0009},
  doi       = {10.1515/gcc-2013-0009},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/KalkaT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/KoblitzM13,
  author    = {Neal Koblitz and
               Alfred Menezes},
  title     = {Another look at non-uniformity},
  journal   = {Groups Complex. Cryptol.},
  volume    = {5},
  number    = {2},
  pages     = {117--139},
  year      = {2013},
  url       = {https://doi.org/10.1515/gcc-2013-0008},
  doi       = {10.1515/gcc-2013-0008},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/KoblitzM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Krammer13,
  author    = {Daan Krammer},
  title     = {An asymmetric generalisation of Artin monoids},
  journal   = {Groups Complex. Cryptol.},
  volume    = {5},
  number    = {2},
  pages     = {141--167},
  year      = {2013},
  url       = {https://doi.org/10.1515/gcc-2013-0010},
  doi       = {10.1515/gcc-2013-0010},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Krammer13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Rosenmann13,
  author    = {Amnon Rosenmann},
  title     = {On the intersection of subgroups in free groups: Echelon subgroups
               are inert},
  journal   = {Groups Complex. Cryptol.},
  volume    = {5},
  number    = {2},
  pages     = {211--221},
  year      = {2013},
  url       = {https://doi.org/10.1515/gcc-2013-0013},
  doi       = {10.1515/gcc-2013-0013},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Rosenmann13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Rybalov13,
  author    = {Alexander N. Rybalov},
  title     = {Generic complexity of the Diophantine problem},
  journal   = {Groups Complex. Cryptol.},
  volume    = {5},
  number    = {1},
  pages     = {25--30},
  year      = {2013},
  url       = {https://doi.org/10.1515/gcc-2013-0004},
  doi       = {10.1515/gcc-2013-0004},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Rybalov13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/CravenJ12,
  author    = {Matthew J. Craven and
               Henri C. Jimbo},
  title     = {Evolutionary algorithm solution of the multiple conjugacy search problem
               in groups, and its applications to cryptography},
  journal   = {Groups Complex. Cryptol.},
  volume    = {4},
  number    = {1},
  pages     = {135--165},
  year      = {2012},
  url       = {https://doi.org/10.1515/gcc-2012-0002},
  doi       = {10.1515/gcc-2012-0002},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/CravenJ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/DiekertDM12,
  author    = {Volker Diekert and
               Andrew J. Duncan and
               Alexei G. Myasnikov},
  title     = {Cyclic rewriting and conjugacy problems},
  journal   = {Groups Complex. Cryptol.},
  volume    = {4},
  number    = {2},
  pages     = {321--355},
  year      = {2012},
  url       = {https://doi.org/10.1515/gcc-2012-0020},
  doi       = {10.1515/gcc-2012-0020},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/DiekertDM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Eftekhari12,
  author    = {Mohammad Eftekhari},
  title     = {A Diffie-Hellman key exchange protocol using matrices over noncommutative
               rings},
  journal   = {Groups Complex. Cryptol.},
  volume    = {4},
  number    = {1},
  pages     = {167--176},
  year      = {2012},
  url       = {https://doi.org/10.1515/gcc-2012-0001},
  doi       = {10.1515/gcc-2012-0001},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Eftekhari12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/ElderRW12,
  author    = {Murray Elder and
               Andrew Rechnitzer and
               Thomas Wong},
  title     = {On the cogrowth of Thompson's group {F}},
  journal   = {Groups Complex. Cryptol.},
  volume    = {4},
  number    = {2},
  pages     = {301--320},
  year      = {2012},
  url       = {https://doi.org/10.1515/gcc-2012-0018},
  doi       = {10.1515/gcc-2012-0018},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/ElderRW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/GrigorievN12,
  author    = {Dima Grigoriev and
               Sergey I. Nikolenko},
  title     = {Continuous hard-to-invert functions and biometric authentication},
  journal   = {Groups Complex. Cryptol.},
  volume    = {4},
  number    = {1},
  pages     = {19--32},
  year      = {2012},
  url       = {https://doi.org/10.1515/gcc-2012-0004},
  doi       = {10.1515/gcc-2012-0004},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/GrigorievN12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/GrigorievS12,
  author    = {Dima Grigoriev and
               Vladimir Shpilrain},
  title     = {No-leak authentication by the Sherlock Holmes method},
  journal   = {Groups Complex. Cryptol.},
  volume    = {4},
  number    = {1},
  pages     = {177--189},
  year      = {2012},
  url       = {https://doi.org/10.1515/gcc-2012-0009},
  doi       = {10.1515/gcc-2012-0009},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/GrigorievS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/HedtkeM12,
  author    = {Ivo Hedtke and
               Sandeep Murthy},
  title     = {Search and test algorithms for triple product property triples},
  journal   = {Groups Complex. Cryptol.},
  volume    = {4},
  number    = {1},
  pages     = {111--133},
  year      = {2012},
  url       = {https://doi.org/10.1515/gcc-2012-0006},
  doi       = {10.1515/gcc-2012-0006},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/HedtkeM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Ibrahim12,
  author    = {Fedaa Ibrahim},
  title     = {Cylinders, multi-cylinders and the induced action of Aut(Fn)},
  journal   = {Groups Complex. Cryptol.},
  volume    = {4},
  number    = {2},
  pages     = {357--375},
  year      = {2012},
  url       = {https://doi.org/10.1515/gcc-2012-0017},
  doi       = {10.1515/gcc-2012-0017},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Ibrahim12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/KahrobaeiK12,
  author    = {Delaram Kahrobaei and
               Charalambos Koupparis},
  title     = {Non-commutative digital signatures},
  journal   = {Groups Complex. Cryptol.},
  volume    = {4},
  number    = {2},
  pages     = {377--384},
  year      = {2012},
  url       = {https://doi.org/10.1515/gcc-2012-0019},
  doi       = {10.1515/gcc-2012-0019},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/KahrobaeiK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/LewisW12,
  author    = {Mark L. Lewis and
               James B. Wilson},
  title     = {Isomorphism in expanding families of indistinguishable groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {4},
  number    = {1},
  pages     = {73--110},
  year      = {2012},
  url       = {https://doi.org/10.1515/gcc-2012-0008},
  doi       = {10.1515/gcc-2012-0008},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/LewisW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Lohrey12,
  author    = {Markus Lohrey},
  title     = {Algorithmics on SLP-compressed strings: {A} survey},
  journal   = {Groups Complex. Cryptol.},
  volume    = {4},
  number    = {2},
  pages     = {241--299},
  year      = {2012},
  url       = {https://doi.org/10.1515/gcc-2012-0016},
  doi       = {10.1515/gcc-2012-0016},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Lohrey12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Neupane12,
  author    = {Kashi Neupane},
  title     = {Two-party key establishment: From passive to active security without
               introducing new assumptions},
  journal   = {Groups Complex. Cryptol.},
  volume    = {4},
  number    = {1},
  pages     = {1--17},
  year      = {2012},
  url       = {https://doi.org/10.1515/gcc-2012-0005},
  doi       = {10.1515/gcc-2012-0005},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Neupane12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Romankov12,
  author    = {Vitalii Roman'kov},
  title     = {Equations over groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {4},
  number    = {2},
  pages     = {191--239},
  year      = {2012},
  url       = {https://doi.org/10.1515/gcc-2012-0015},
  doi       = {10.1515/gcc-2012-0015},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Romankov12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Wilson12,
  author    = {James B. Wilson},
  title     = {Existence, algorithms, and asymptotics of direct product decompositions,
               {I}},
  journal   = {Groups Complex. Cryptol.},
  volume    = {4},
  number    = {1},
  pages     = {33--72},
  year      = {2012},
  url       = {https://doi.org/10.1515/gcc-2012-0007},
  doi       = {10.1515/gcc-2012-0007},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Wilson12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Antolin11,
  author    = {Yago Antol{\'{\i}}n},
  title     = {On Cayley graphs of virtually free groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {3},
  number    = {2},
  pages     = {301--327},
  year      = {2011},
  url       = {https://doi.org/10.1515/gcc.2011.012},
  doi       = {10.1515/gcc.2011.012},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Antolin11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/BacarditD11,
  author    = {Llu{\'{\i}}s Bacardit and
               Warren Dicks},
  title     = {The Zieschang-McCool method for generating algebraic mapping-class
               groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {3},
  number    = {2},
  pages     = {187--220},
  year      = {2011},
  url       = {https://doi.org/10.1515/gcc.2011.007},
  doi       = {10.1515/gcc.2011.007},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/BacarditD11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/BonanomeM11,
  author    = {Marianna Bonanome and
               Stephen Majewicz},
  title     = {Quantum algorithms for fixed points and invariant subgroups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {3},
  number    = {2},
  pages     = {329--348},
  year      = {2011},
  url       = {https://doi.org/10.1515/gcc.2011.013},
  doi       = {10.1515/gcc.2011.013},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/BonanomeM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Bremner11,
  author    = {Murray R. Bremner},
  title     = {How to compute the Wedderburn decomposition of a finite-dimensional
               associative algebra},
  journal   = {Groups Complex. Cryptol.},
  volume    = {3},
  number    = {1},
  pages     = {47--66},
  year      = {2011},
  url       = {https://doi.org/10.1515/gcc.2011.003},
  doi       = {10.1515/gcc.2011.003},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Bremner11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/CarboneCR11,
  author    = {Lisa Carbone and
               Leigh Cobbs and
               Gabriel Rosenberg},
  title     = {Tree lattice subgroups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {3},
  number    = {1},
  pages     = {1--23},
  year      = {2011},
  url       = {https://doi.org/10.1515/gcc.2011.001},
  doi       = {10.1515/gcc.2011.001},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/CarboneCR11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/FalconerFK11,
  author    = {Kenneth J. Falconer and
               Benjamin Fine and
               Delaram Kahrobaei},
  title     = {Growth rate of an endomorphism of a group},
  journal   = {Groups Complex. Cryptol.},
  volume    = {3},
  number    = {2},
  pages     = {285--300},
  year      = {2011},
  url       = {https://doi.org/10.1515/gcc.2011.011},
  doi       = {10.1515/gcc.2011.011},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/FalconerFK11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/FineR11,
  author    = {Benjamin Fine and
               Gerhard Rosenberger},
  title     = {A note on faithful representations of limit groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {3},
  number    = {2},
  pages     = {349--355},
  year      = {2011},
  url       = {https://doi.org/10.1515/gcc.2011.014},
  doi       = {10.1515/gcc.2011.014},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/FineR11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/GilmanMR11,
  author    = {Robert H. Gilman and
               Alexei G. Myasnikov and
               Vitalii Roman'kov},
  title     = {Random equations in free groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {3},
  number    = {2},
  pages     = {257--284},
  year      = {2011},
  url       = {https://doi.org/10.1515/gcc.2011.010},
  doi       = {10.1515/gcc.2011.010},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/GilmanMR11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Miller11,
  author    = {Russell Miller},
  title     = {An introduction to computable model theory on groups and fields},
  journal   = {Groups Complex. Cryptol.},
  volume    = {3},
  number    = {1},
  pages     = {25--45},
  year      = {2011},
  url       = {https://doi.org/10.1515/gcc.2011.002},
  doi       = {10.1515/gcc.2011.002},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Miller11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/MosinaU11,
  author    = {Natalia Mosina and
               Alexander Ushakov},
  title     = {Strong law of large numbers on graphs and groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {3},
  number    = {1},
  pages     = {67--103},
  year      = {2011},
  url       = {https://doi.org/10.1515/gcc.2011.004},
  doi       = {10.1515/gcc.2011.004},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/MosinaU11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/MyasnikovU11,
  author    = {Alexei G. Myasnikov and
               Alexander Ushakov},
  title     = {Random van Kampen diagrams and algorithmic problems in groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {3},
  number    = {1},
  pages     = {121--185},
  year      = {2011},
  url       = {https://doi.org/10.1515/gcc.2011.006},
  doi       = {10.1515/gcc.2011.006},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/MyasnikovU11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/SeberryTT11,
  author    = {Jennifer Seberry and
               Vinhbuu To and
               Dongvu Tonien},
  title     = {A new generic digital signature algorithm},
  journal   = {Groups Complex. Cryptol.},
  volume    = {3},
  number    = {2},
  pages     = {221--237},
  year      = {2011},
  url       = {https://doi.org/10.1515/gcc.2011.008},
  doi       = {10.1515/gcc.2011.008},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/SeberryTT11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Vassileva11,
  author    = {Svetla Vassileva},
  title     = {Polynomial time conjugacy in wreath products and free solvable groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {3},
  number    = {1},
  pages     = {105--120},
  year      = {2011},
  url       = {https://doi.org/10.1515/gcc.2011.005},
  doi       = {10.1515/gcc.2011.005},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Vassileva11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Wassink11,
  author    = {Bronlyn Wassink},
  title     = {Subgroups of R. Thompson's group {F} that are isomorphic to {F}},
  journal   = {Groups Complex. Cryptol.},
  volume    = {3},
  number    = {2},
  pages     = {239--256},
  year      = {2011},
  url       = {https://doi.org/10.1515/gcc.2011.009},
  doi       = {10.1515/gcc.2011.009},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Wassink11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/AmirG10,
  author    = {Gideon Amir and
               Ori Gurel{-}Gurevich},
  title     = {The diameter of a random Cayley graph of {\(\mathbb{Z}\)} q},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {1},
  pages     = {59--65},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.004},
  doi       = {10.1515/gcc.2010.004},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/AmirG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/BaumslagBFT10,
  author    = {Gilbert Baumslag and
               Yegor Bryukhov and
               Benjamin Fine and
               Douglas Troeger},
  title     = {Challenge response password security using combinatorial group theory},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {1},
  pages     = {67--81},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.005},
  doi       = {10.1515/gcc.2010.005},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/BaumslagBFT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/CarstensenFR10,
  author    = {Celine Carstensen and
               Benjamin Fine and
               Gerhard Rosenberger},
  title     = {On asymptotic densities and generic properties in finitely generated
               groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {2},
  pages     = {113--121},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.008},
  doi       = {10.1515/gcc.2010.008},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/CarstensenFR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/ChumZ10,
  author    = {Chi Sing Chum and
               Xiaowen Zhang},
  title     = {The Latin squares and the secret sharing schemes},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {2},
  pages     = {175--202},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.011},
  doi       = {10.1515/gcc.2010.011},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/ChumZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Conder10,
  author    = {Marston D. E. Conder},
  title     = {An update on Hurwitz groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {1},
  pages     = {35--49},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.002},
  doi       = {10.1515/gcc.2010.002},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Conder10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/ElderR10,
  author    = {Murray Elder and
               Andrew Rechnitzer},
  title     = {Some geodesic problems in groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {2},
  pages     = {223--229},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.014},
  doi       = {10.1515/gcc.2010.014},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/ElderR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Ito10,
  author    = {Tetsuya Ito},
  title     = {On finite Thurston-type orderings of braid groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {2},
  pages     = {123--155},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.009},
  doi       = {10.1515/gcc.2010.009},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Ito10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/JovanovicK10,
  author    = {Philipp Jovanovic and
               Martin Kreuzer},
  title     = {Algebraic attacks using SAT-solvers},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {2},
  pages     = {247--259},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.016},
  doi       = {10.1515/gcc.2010.016},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/JovanovicK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/KalkaLT10,
  author    = {Arkadius G. Kalka and
               Eran Liberman and
               Mina Teicher},
  title     = {Subgroup conjugacy problem for Garside subgroups of Garside groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {2},
  pages     = {157--174},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.010},
  doi       = {10.1515/gcc.2010.010},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/KalkaLT10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Kassabov10,
  author    = {Martin Kassabov},
  title     = {Presentations of matrix rings},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {1},
  pages     = {51--57},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.003},
  doi       = {10.1515/gcc.2010.003},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Kassabov10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Kron10,
  author    = {Bernhard Kr{\"{o}}n},
  title     = {Cutting up graphs revisited - a short proof of Stallings' structure
               theorem},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {2},
  pages     = {213--221},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.013},
  doi       = {10.1515/gcc.2010.013},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Kron10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Mahalanobis10,
  author    = {Ayan Mahalanobis},
  title     = {The discrete logarithm problem in the group of non-singular circulant
               matrices},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {1},
  pages     = {83--89},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.006},
  doi       = {10.1515/gcc.2010.006},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Mahalanobis10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Neumann-BrosigR10,
  author    = {Matthias Neumann{-}Brosig and
               Gerhard Rosenberger},
  title     = {A note on the homology of hyperbolic groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {2},
  pages     = {203--212},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.012},
  doi       = {10.1515/gcc.2010.012},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Neumann-BrosigR10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Shevlyakov10,
  author    = {Artem N. Shevlyakov},
  title     = {Algebraic geometry over natural numbers. The classification of coordinate
               monoids},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {1},
  pages     = {91--111},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.007},
  doi       = {10.1515/gcc.2010.007},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Shevlyakov10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Shpilrain10,
  author    = {Vladimir Shpilrain},
  title     = {Search and witness problems in group theory},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {2},
  pages     = {231--246},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.015},
  doi       = {10.1515/gcc.2010.015},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Shpilrain10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Weiss10,
  author    = {Uri Weiss},
  title     = {On Shephard groups with large triangles},
  journal   = {Groups Complex. Cryptol.},
  volume    = {2},
  number    = {1},
  pages     = {1--34},
  year      = {2010},
  url       = {https://doi.org/10.1515/gcc.2010.001},
  doi       = {10.1515/gcc.2010.001},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Weiss10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/BacarditD09,
  author    = {Llu{\'{\i}}s Bacardit and
               Warren Dicks},
  title     = {Actions of the Braid Group, and New Algebraic Proofs of Results of
               Dehornoy and Larue},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {1},
  pages     = {77--129},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.77},
  doi       = {10.1515/GCC.2009.77},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/BacarditD09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Chouraqui09,
  author    = {Fabienne Chouraqui},
  title     = {Rewriting Systems and Embedding of Monoids in Groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {1},
  pages     = {131--140},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.131},
  doi       = {10.1515/GCC.2009.131},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Chouraqui09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Clement09,
  author    = {Anthony E. Clement},
  title     = {Torsion-free Abelian Factor Groups of the Baumslag-Solitar Groups
               and Subgroups of the Additive Group of the Rational Numbers},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {2},
  pages     = {165--168},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.165},
  doi       = {10.1515/GCC.2009.165},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Clement09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Dean09,
  author    = {Margaret H. Dean},
  title     = {Metabelian Product of a Free Nilpotent Group with a Free Abelian Group},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {2},
  pages     = {169--180},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.169},
  doi       = {10.1515/GCC.2009.169},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Dean09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/FineMR09,
  author    = {Benjamin Fine and
               Alexei G. Myasnikov and
               Gerhard Rosenberger},
  title     = {Generic Subgroups of Group Amalgams},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {1},
  pages     = {51--61},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.51},
  doi       = {10.1515/GCC.2009.51},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/FineMR09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/GaglioneLS09,
  author    = {Anthony M. Gaglione and
               Seymour Lipschutz and
               Dennis Spellman},
  title     = {Almost Locally Free Groups and a Theorem of Magnus: Some Questions},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {2},
  pages     = {181--198},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.181},
  doi       = {10.1515/GCC.2009.181},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/GaglioneLS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/GrigorievHP09,
  author    = {Dima Grigoriev and
               Edward A. Hirsch and
               Konstantin Pervyshev},
  title     = {A Complete Public-Key Cryptosystem},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {1},
  pages     = {1--12},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.1},
  doi       = {10.1515/GCC.2009.1},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/GrigorievHP09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/GrigorievS09,
  author    = {Dima Grigoriev and
               Vladimir Shpilrain},
  title     = {Authentication from Matrix Conjugation},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {2},
  pages     = {199--205},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.199},
  doi       = {10.1515/GCC.2009.199},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/GrigorievS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/KahrobaeiA09,
  author    = {Delaram Kahrobaei and
               Michael Anshel},
  title     = {Decision and Search in Non-Abelian Cramer-Shoup Public Key Cryptosystem},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {2},
  pages     = {217--225},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.217},
  doi       = {10.1515/GCC.2009.217},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/KahrobaeiA09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/KalkaLT09,
  author    = {Arkadius G. Kalka and
               Eran Liberman and
               Mina Teicher},
  title     = {A Note on the Shifted Conjugacy Problem in Braid Groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {2},
  pages     = {227--230},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.227},
  doi       = {10.1515/GCC.2009.227},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/KalkaLT09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Kreuzer09,
  author    = {Martin Kreuzer},
  title     = {Algebraic Attacks Galore!},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {2},
  pages     = {231--259},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.231},
  doi       = {10.1515/GCC.2009.231},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Kreuzer09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/LakinT09,
  author    = {Stephen R. Lakin and
               Richard M. Thomas},
  title     = {Space Complexity and Word Problems of Groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {2},
  pages     = {261--273},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.261},
  doi       = {10.1515/GCC.2009.261},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/LakinT09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/LongriggU09,
  author    = {Jonathan Longrigg and
               Alexander Ushakov},
  title     = {A Practical Attack on a Certain Braid Group Based Shifted Conjugacy
               Authentication Protocol},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {2},
  pages     = {275--286},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.275},
  doi       = {10.1515/GCC.2009.275},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/LongriggU09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Maclachlan09,
  author    = {Colin Maclachlan},
  title     = {Existence and Non-Existence of Torsion in Maximal Arithmetic Fuchsian
               Groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {2},
  pages     = {287--295},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.287},
  doi       = {10.1515/GCC.2009.287},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Maclachlan09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/MajewiczZ09,
  author    = {Stephen Majewicz and
               Marcos Zyman},
  title     = {Power-Commutative Nilpotent R-Powered Groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {2},
  pages     = {297--309},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.297},
  doi       = {10.1515/GCC.2009.297},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/MajewiczZ09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Myasnikov09,
  author    = {Alex D. Myasnikov},
  title     = {Generic Case Complexity and One-Way Functions},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {1},
  pages     = {13--31},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.13},
  doi       = {10.1515/GCC.2009.13},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Myasnikov09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/MyasnikovU09,
  author    = {Alex D. Myasnikov and
               Alexander Ushakov},
  title     = {Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux Key Agreement
               Protocol},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {1},
  pages     = {63--75},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.63},
  doi       = {10.1515/GCC.2009.63},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/MyasnikovU09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Osin09,
  author    = {Denis Osin},
  title     = {On the Universal Theory of Torsion and Lacunary Hyperbolic Groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {2},
  pages     = {311--319},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.311},
  doi       = {10.1515/GCC.2009.311},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Osin09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/RebelHR09,
  author    = {Volkmar gro{\ss}e Rebel and
               Miriam Hahn and
               Gerhard Rosenberger},
  title     = {The Tits Alternative for Tsaranov's Generalized Tetrahedron Groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {2},
  pages     = {207--216},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.207},
  doi       = {10.1515/GCC.2009.207},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/RebelHR09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/Shnaps09,
  author    = {Daniella Bak Shnaps},
  title     = {The Word and Conjugacy Problem for Shuffle Groups},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {2},
  pages     = {143--164},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.143},
  doi       = {10.1515/GCC.2009.143},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/Shnaps09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gcc/ShpilrainZ09,
  author    = {Vladimir Shpilrain and
               Gabriel Zapata},
  title     = {Using Decision Problems in Public Key Cryptography},
  journal   = {Groups Complex. Cryptol.},
  volume    = {1},
  number    = {1},
  pages     = {33--49},
  year      = {2009},
  url       = {https://doi.org/10.1515/GCC.2009.33},
  doi       = {10.1515/GCC.2009.33},
  timestamp = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/gcc/ShpilrainZ09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics