Cryptology ePrint Archive: Report 2010/024

Available versions in chronological order


Authentication schemes from actions on graphs, groups, or rings
Dima Grigoriev and Vladimir Shpilrain


[ Cryptology ePrint archive ]