Alexander Ushakov

Orcid: 0000-0001-9042-7857

According to our database1, Alexander Ushakov authored at least 41 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Complexity of Spherical Equations in Finite Groups.
Proceedings of the SOFSEM 2024: Theory and Practice of Computer Science, 2024

2023
Quadratic equations in metabelian Baumslag-Solitar groups.
Int. J. Algebra Comput., September, 2023

2021
Linear time algorithm for the conjugacy problem in the first Grigorchuk group.
Int. J. Algebra Comput., 2021

2020
On subset sum problem in branch groups.
CoRR, 2020

Soft Decision Decoding in Mud Pulse Telemetry System.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

2019
Conjugacy search problem and the Andrews-Curtis conjecture.
Groups Complex. Cryptol., 2019

An attack on the Walnut digital signature algorithm.
Des. Codes Cryptogr., 2019

2018
Subset sum problem in polycyclic groups.
J. Symb. Comput., 2018

Attack on Kayawood Protocol: Uncloaking Private Keys.
IACR Cryptol. ePrint Arch., 2018

Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2018

Analysis of secret sharing schemes based on Nielsen transformations.
Groups Complex. Cryptol., 2018

2016
Knapsack problems in products of groups.
J. Symb. Comput., 2016

Generic case completeness.
J. Comput. Syst. Sci., 2016

Authenticated commutator key agreement protocol.
Groups Complex. Cryptol., 2016

2015
Knapsack problems in groups.
Math. Comput., 2015

Analysis of a certain polycyclic-group-based cryptosystem.
J. Math. Cryptol., 2015

Search problems in groups and branching processes.
Int. J. Algebra Comput., 2015

Analysis of a key exchange protocol based on tropical matrix algebra.
IACR Cryptol. ePrint Arch., 2015

A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups.
IACR Cryptol. ePrint Arch., 2015

Non-commutative lattice problems.
CoRR, 2015

2014
Quantum algorithm for discrete logarithm problem for matrices over finite group rings.
Groups Complex. Cryptol., 2014

A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
The Post correspondence problem in groups.
CoRR, 2013

2012
Power Circuits, exponential Algebra, and Time Complexity.
Int. J. Algebra Comput., 2012

Efficient Algorithms for Highly Compressed Data: the Word Problem in Higman's Group is in P.
Int. J. Algebra Comput., 2012

Cryptanalysis of matrix conjugation schemes.
IACR Cryptol. ePrint Arch., 2012

2011
Random van Kampen diagrams and algorithmic problems in groups.
Groups Complex. Cryptol., 2011

Strong law of large numbers on graphs and groups.
Groups Complex. Cryptol., 2011

2010
Mean-set attack: cryptanalysis of Sibert et al. authentication protocol.
J. Math. Cryptol., 2010

2009
Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux Key Agreement Protocol.
Groups Complex. Cryptol., 2009

A Practical Attack on a Certain Braid Group Based Shifted Conjugacy Authentication Protocol.
Groups Complex. Cryptol., 2009

2008
Random subgroups and analysis of the length-based and quotient attacks.
J. Math. Cryptol., 2008

Cryptanalysis of the shifted conjugacy authentication protocol.
J. Math. Cryptol., 2008

An Authentication Scheme Based on the Twisted Conjugacy Problem.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Report on Generic Case Complexity
CoRR, 2007

Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol.
Proceedings of the Public Key Cryptography, 2007

2006
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient.
Appl. Algebra Eng. Commun. Comput., 2006

Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol.
Proceedings of the Public Key Cryptography, 2006

2005
A new key exchange protocol based on the decomposition problem.
IACR Cryptol. ePrint Arch., 2005

A Practical Attack on a Braid Group Based Cryptographic Protocol.
Proceedings of the Advances in Cryptology, 2005

Thompson's Group and Public Key Cryptography.
Proceedings of the Applied Cryptography and Network Security, 2005


  Loading...