Return to Article Details
Some attacks of an encryption system based on the word problem in a monoid
Download
Download PDF