[1]
N. Ghadbane and D. Mihoubi, “Some attacks of an encryption system based on the word problem in a monoid”, IJAMR, vol. 5, no. 4, pp. 158–161, Sep. 2016, doi: 10.14419/ijamr.v5i4.6204.