Alexander Ushakov
Orcid: 0000-0001-9042-7857
According to our database1,
Alexander Ushakov
authored at least 41 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the SOFSEM 2024: Theory and Practice of Computer Science, 2024
2023
Int. J. Algebra Comput., September, 2023
2021
Int. J. Algebra Comput., 2021
2020
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020
2019
Groups Complex. Cryptol., 2019
2018
J. Math. Cryptol., 2018
Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2018
Groups Complex. Cryptol., 2018
2016
2015
IACR Cryptol. ePrint Arch., 2015
2014
Quantum algorithm for discrete logarithm problem for matrices over finite group rings.
Groups Complex. Cryptol., 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
2012
Int. J. Algebra Comput., 2012
Efficient Algorithms for Highly Compressed Data: the Word Problem in Higman's Group is in P.
Int. J. Algebra Comput., 2012
2011
Groups Complex. Cryptol., 2011
2010
J. Math. Cryptol., 2010
2009
Groups Complex. Cryptol., 2009
A Practical Attack on a Certain Braid Group Based Shifted Conjugacy Authentication Protocol.
Groups Complex. Cryptol., 2009
2008
J. Math. Cryptol., 2008
J. Math. Cryptol., 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol.
Proceedings of the Public Key Cryptography, 2007
2006
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient.
Appl. Algebra Eng. Commun. Comput., 2006
Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol.
Proceedings of the Public Key Cryptography, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Applied Cryptography and Network Security, 2005