Cryptology ePrint Archive: Report 2010/024
Available versions in chronological order
20100116:062629 (posted 16-Jan-2010 06:26:29 UTC)
Authentication schemes from actions on graphs, groups, or rings
Dima Grigoriev and Vladimir Shpilrain
[
Cryptology ePrint archive
]