Return to Article Details Some attacks of an encryption system based on the word problem in a monoid Download Download PDF