Citing papers

Citing papers

This page contains a list of papers that cite the works of Boaz Tsaban, with the belief that anyone who finds Tsaban's works interesting may find the following papers interesting as well. The titles were collected using search engines, and the webpage created by a cshell, which also calculated the number of citing papers per author and per journal (see below). Please report errors or possible additions to tsaban@math.biu.ac.il

Citing papers that are published or in press

  1. R. AlTawy, A. Youssef, Differential sieving for 2-step matching Meet-in-the-Middle attack with application to LBlock, Lecture Notes in Computer Science 8898 (2015), 126-139.
  2. R. AlTawy, M. Tolba, A. Youssef, A Higher order key partitioning attack with application to LBlock, Lecture Notes in Computer Science 9084 (2015), 215-227.
  3. R. AlTawy, R. Rohit, M. He, K. Mandal, G. Yang, G. Gong, SLISCP-light: Towards Hardware Optimized Sponge-specific Cryptographic Permutations, ACM Transactions on Embedded Computing Systems 17 (2018).
  4. O. Alas, L. Aurichi, L. Junqueira, F. Tall, Non-productively Lindelöf spaces and small cardinals, Houston Journal of Mathematics 37 (2011), 1373-1381.
  5. M. Albrecht, C. Rechberger, T. Schneider, T. Tiessen, M. Zohner, Ciphers for MPC and FHE, Lecture Notes in Computer Science 9056 (2015), 430-454.
  6. S. Alexander, Guessing, mind-changing, and the second ambiguous class, Notre Dame Journal of Formal Logic 57 (2016), 209-220.
  7. S. Alexander, On guessing whether a sequence has a certain property, Journal of Integer Sequences 14 (2011), 11.4.4.
  8. A. Aljaba, K. Al-Shehri, Analysis of counter aided LFSR based crypto systems, ICMSAO (2005), 1-3.
  9. O. Althobaiti, H. Aboalsamh, An enhanced elliptic curve cryptography for biometric, ICCCT (2012), 1048-1055.
  10. V. Anashin, A. Bogdanov, I. Kizhvatov, S. Kumar, ABC: A New Fast Flexible Stream Cipher, SKEW - Symmetric Key Encryption Workshop (2005).
  11. V. Anashin, A. Khrennikov, Applied Algebraic Dynamics, de Gruyter Expositions in Mathematics 49 (2009), Walter de Gruyter, Berlin, New York.
  12. V. Anashin, D. Lin, T. Shi, Linear weaknesses in T-functions, Lecture Notes in Computer Science 7280 (2012), 279-290.
  13. U. Andrews, I. Goldbring, Hindman?s theorem and idempotent types, Semigroup Forum (2018), to appear.
  14. I. Anshel, D. Atkins, D. Goldfeld, P. Gunnells, Kayawood, a Key Agreement Protocol, , IACR eprint.
  15. I. Anshel, M. Anshel, D. Goldfeld, S. Lemieux, Key agreement, the Algebraic EraserTM, and lightweight cryptography, Contemporary Mathematics 41 (2006), 1-38.
  16. F. Arnault, T. Berger, M. Minier, B. Pousse, Revisiting LFSRs for cryptographic applications, IEEE Transactions on Information Theory 57 (2011), 8095-8113.
  17. O. Au, Z. He, W. Pei, K. Wang, J. Zhou, Asymptotic model of deterministic randomness and its application to secure communications, WSEAS Transactions on Circuits and Systems 5 (2006), 305-310.
  18. L. Aurichi, Selectively c.c.c. spaces, Topology and its Applications 160 (2013), 2243-2250.
  19. L. Aurichi, A. Bella, R. Dias, Tightness games with bounded finite selections, Israel Journal of Mathematics 224 (2018), 133-158.
  20. L. Aurichi, F. Tall, Lindelöf spaces which are indestructible, productive, or D, Topology and its Applications 159 (2012), 331-340.
  21. L. Aurichi, R. Dias, A minicourse on topological games, Topology and its Applications (2019),.
  22. L. Aurichi, R. Dias, Topological games and Alster spaces, Canadian Mathematical Bulletin 57 (2014), 683-696.
  23. L. Aurichi, R. Mezabarba, Bornologies and filters in selection principles on function spaces, Topology and its Applications (2019),.
  24. L. Aurichi, S. Spadaro, L. Zdomskyy, Selective versions of chain condition-type properties, Acta Mathematica Hungarica 148 (2016), 1-16.
  25. L. Babinkostova, Metrizable groups and strict o-boundedness, Matematicki Vesnik 58 (2006), 131-138.
  26. L. Babinkostova, Selective screenability in topological groups, Topology and its Applications 156 (2008), 2-9.
  27. L. Babinkostova, B. Pansera, M. Scheepers, Selective versions of q-density, , arXiv eprint 1808.07174, 2018.
  28. L. Babinkostova, B. Pansera, M. Scheepers, Weak covering properties and infinite games, Topology and its Applications 159 (2012), 3644-3657.
  29. L. Babinkostova, B. Pansera, M. Scheepers, Weak covering properties and selection principles, Topology and its Applications 160 (2013), 2251-2271.
  30. L. Babinkostova, L. Kocinac, M. Scheepers, Combinatorics of open covers (XI): Menger- and Rothberger-bounded groups, Topology and its Applications 154 (2007), 1269-1280.
  31. L. Babinkostova, M. Scheepers, Combinatorics of open covers (IX): Basis properties, Note di Matematica 22 (2003), 167-178.
  32. P. Bal, S. Bhowmik, Some new star-selection principles in topology, Filomat 31 (2017), 4041-4050.
  33. T. Banakh, P0-spaces, Topology and its Applications 195 (2015), 151-173.
  34. T. Banakh, Cardinal characteristics of the ideal of Haar null sets, Commentationes Mathematicae Universitatis Carolinae 45 (2004), 119-137.
  35. T. Banakh, A. Leiderman, ww-dominated function spaces and ww-bases in free objects of topological algebra, Topology and its Applications 241 (2018), 203-241.
  36. T. Banakh, D. Repovs, Sequential rectifiable spaces of countable cs*-character, Bulletin of the Malaysian Mathematical Sciences Society 40 (2017), 975-993.
  37. T. Banakh, D. Repovs, L. Zdomskyy, o-boundedness of free topological groups, Topology and its Applications 157 (2010), 466-481.
  38. T. Banakh, D. Repovs, L. Zdomskyy, On the length of chains of proper subgroups covering a topological group, Archive for Mathematical Logic 50 (2011), 411-421.
  39. T. Banakh, L. Zdomskyy, Coherence of Semifilters, Memoirs of the American Mathematical Society, to appear.
  40. T. Banakh, L. Zdomskyy, Coherence of Semifilters: a survey, in: Selection Principles and Covering Properties in Topology (L. Kocinac, ed.), Quaderni di Matematica 18 (2006), 53-105.
  41. T. Banakh, L. Zdomskyy, Selection principles and infinite games on multicovered spaces, in: Selection Principles and Covering Properties in Topology (L. Kocinac, ed.), Quaderni di Matematica 18 (2006), 1-52.
  42. T. Banakh, L. Zdomskyy, Separation properties between s-compactness and Hurewicz property, Topology and its Applications 156 (2008), 10-15.
  43. T. Banakh, P. Nickolas, M. Sanchis, Filter games and pathological subgroups of a countable product of lines, Journal of the Australian Mathematical Society 81 (2006), 321-350.
  44. T. Banakh, R. Cauty, M. Zarichnyi, Open problems in infinite-dimensional topology, in: Open Problems in Topology II (E. Pearl, ed.) (2007), 595-618.
  45. T. Banakh, S. Gabriyelyan, On the Ck-stable closure of the class of (separable) metrizable spaces, Monatshefte für Mathematik 180 (2016), 39-64.
  46. S. Baratella, S. Ng, Isometry games in Banach spaces, Bulletin Belgian Mathematical Society - Simon Stevin 15 (2008), 509-521.
  47. A. Barenghi, N. Mainardi, G. Pelosi, Comparison-based attacks against noise-free fully homomorphic encryption schemes, Lecture Notes in Computer Science 11149 (2018), 177-191.
  48. D. Barman, A. Dow, Selective separability and SS+, Topology Proceedings 37 (2011), 181-204.
  49. F. Basile, N. Carlson, On the cardinality of Urysohn spaces and weakly H-closed spaces, Mathematica Bohemica (2019).
  50. F. Basile, N. Messina, On the cardinality of Urysohn spaces and weakly H-closed spaces, Mathematica Bohemica, to appear.
  51. L. Batina, J. Lano, N. Mentens, S. Örs, B. Preneel, I. Verbauwhede, Energy, performance, area versus security trade-offs for stream Ciphers, ECRYPT Workshop, SASC - The State of the Art of Stream Ciphers (2004), 302-310.
  52. G. Baumslag, N. Fazio, A. Nicolosi, V. Shpilrain, and W. Skeith, Generalized learning problems and applications to non-commutative cryptography, Lecture Notes in Computer Science 6980 (2011), 324-339.
  53. G. Beer, A. Caserta, G. Di-Maio, R. Lucchetti, Convergence of partial maps, Journal of Mathematical Analysis and Applications 419 (214), 1274-1289.
  54. E. Begelfor, S. Miller, R. Venkatesan, Non-abelian analogs of lattice rounding, Groups Complexity Cryptology 7 (2015), 117-133.
  55. A. Bella, On two selection principles and the corresponding games, Topology and its Applications 160 (2013), 2309-2313.
  56. A. Bella, When is a Pixley-Roy hyperspace SS+?, Topology and its Applications 160 ( 2013), 99-104.
  57. A. Bella, M. Matveev, S. Spadaro, Variations of selective separability II: Discrete sets and the influence of convergence and maximality, Topology and its Applications 159 (2012), 253-271.
  58. D. Bernal-Santos, T. Tamariz-Mascarúa, The Menger property on Cp(X,2), Topology and its Applications 183 (2015), 110-126.
  59. W. Beullens, S. Blackburn, Practical attacks against the Walnut digital signature scheme, Asiacrypt (2018).
  60. B. Biswas, K. Pal, V. Gupta, Elgamal key exchange using Triple Decomposition Problem, ACCN (2017), 123-127.
  61. S. Blackburn, C. Cid, C. Mullan, Group theory in cryptography, London Mathematical Society Lecture Note Series 387 (2011), 133-149.
  62. S. Blackburn, M. Robashow, On the security of the Algebraic Eraser tag authentication protocol, Lecture Notes in Computer Science 9696 (2016), 3-17.
  63. K. Blaney, A. Nikolaev, A PTIME solution to the restricted conjugacy problem in generalized Heisenberg groups, Groups Complexity Cryptology 8 (2016), 69-74.
  64. M. Boesgaard, J. Christiansen, T. Pedersen, V. Rijmen, O. Scavenius, Periodic properties of counter assisted stream ciphers, Lecture Notes in Computer Science 2964 (2004), 39-53.
  65. M. Boesgaard, J. Christiansen, T. Pedersen, V. Rijmen, O. Scavenius, Rabbit: A new high-performance stream cipher, Lecture Notes in Computer Science 2887 (2003), 307-329.
  66. M. Boesgaard, M. Vesterager, E. Zenner, The Rabbit stream cipher, Lecture Notes in Computer Science 4986 (2008), 69-83.
  67. V. Bogachev, Negligible Sets in Infinite-Dimensional Spaces, Analysis Mathematica 44 2018 (299-323),.
  68. J. Bohli, B. Glas, R. Steinwandt, Towards provably secure group key agreement building on group theory, Lecture Notes in Computer Science 4341 (2006), 322-336.
  69. M. Bonanzinga, D. Stavrova, P. Staynova, Combinatorial separation axioms and cardinal invariants, Topology and its Applications 201 2016 (441-451),.
  70. M. Bonanzinga, F. Cammaroto, M. Matveev, Projective versions of selection principles, Topology and its Applications 157 (2010), 874-893.
  71. M. Bonanzinga, M. Matveev, Dowker-type example and Arhangelskii's a2-property, Topology and its Applications 160 (2013), 2351-2355.
  72. M. Bonanzinga, M. Matveev, Some covering properties for Y-spaces, Matematicki Vesnik 61 (2009), 3-11.
  73. T. Breuckmann, S. Kudri, Hurewicz spaces and the selectively w*-grouping property, Fuzzy Sets and Systems 157 (2006), 804-812.
  74. W. Brian, J. Verner, Gd and comeager semifilters, Fundamenta Mathematicae 235 (2016), 153-166.
  75. D. Brink, A (probably) exact solution to the Birthday Problem, Ramanujan Journal 28 (2012), 223-238.
  76. L. Bromberg, V. Shpilrain, A. Vdovina, Navigating in the Cayley graph of SL2(\mathbbFp) and applications to hashing, Semigroup Forum, to appear.
  77. L. Bukovský, Convergence of Real Functions and Covering Properties, in: Selection Principles and Covering Properties in Topology (L. Kocinac, ed.), Quaderni di Matematica 18 (2007), 107-132.
  78. L. Bukovský, Hurewicz properties, not distinguishing convergence properties, and sequence selection properties, Acta Universitatis Carolinae - Mathematica et Physica 44 (2003), 45-56.
  79. L. Bukovský, On wQN* and wQN* spaces, Topology and its Applications 156 (2008), 24-27.
  80. L. Bukovský, The Structure of the Real Line, Monografie Matematyczne 71 (2011), Birkhäuser, Springer.
  81. L. Bukovský, J. Hales, QN-spaces, wQN-spaces and covering properties, Topology and its Applications 154 (2007), 848-858.
  82. L. Bukovský, J. Supina, Modifications of sequence selection principles, Topology and its Applications 160 (2013), 2356-2370.
  83. L. Bukovský, J. Supina, Sequence selection principles for quasi-normal convergence, Topology and its Applications 159 (2012), 283-289.
  84. P. Burton, F. Tall, Productive Lindeöfness and a class of spaces considered by Z. Frolik, Topology and its Applications 159 (2012), 3097-3102.
  85. J. Camargo, C. Uzcátegui, Selective separability on spaces with an analytic topology, Topology and its Applications 248 (2018), 176-191.
  86. F. Cammaroto, A. Catalioto, B. Pansera, J. Porter, On the cardinality of the q-closed hull of sets II, Filomat 27 (2013), 1107-1111.
  87. Z. Cao, L. Chen, Approaches to resisting length-based attack, Journal of Shanghai Jiaotong University 44 (2010), 968-974.
  88. J. Casas-de-la-Rosa, S. Garcia-Balan, P. Szeptycki, Some star and strongly star selection principles, Topology and its Applications (2017).
  89. A. Caserta, G. Di-Maio, Variations on selective separability in non-regular spaces, Topology and its Applications 160 (2013), 2379-2385.
  90. A. Caserta, G. Di-Maio, L. Kocinac, Bornologies, selection principles and function spaces, Topology and its Applications 159 (2012), 1847-1852.
  91. A. Caserta, G. Di-Maio, L. Kocinac, Versions of properties (a) and (pp), Topology and its Applications 158 (2011), 1360-1368.
  92. G. Castellan, Density estimation via exponential model selection, IEEE Transactions on Information Theory 49 (2003), 2052-2060.
  93. B. Cavallo, D. Kahrobaei, A family of polycyclic groups over which the conjugacy problem is NP-complete, International Journal of Algebra and Computation 24 (2014), 515-530.
  94. D. Chandra, P. Das, Some further investigations of open covers and selection principles using ideals, Topology Proceedings 39 (2012), 281-291.
  95. D. Chandra, P. Das, L. Kocinac, Some remarks on open covers and selection principles using ideals, Topology and its Applications 202 (2016), 183-193.
  96. Q. Cheng, G. Han, C. Ma, A generalization of DSA based on the Conjugacy Search Problem, Education Technology and Computer Science 3 (2010), 348-351.
  97. Y. Cheung, W. Pei, K. Wang, H. Xia, L. Zou, Pseudo-random number generator based on asymptotic deterministic randomness, Physics Letters A 372 (2008), 4388-4394.
  98. Y. Cheung, Z. He, W. Pei, K. Wang, L. Zou, The asymptotic deterministic randomness, Physics Letters A 368 (2007), 38-47.
  99. A. Childs, G. Ivanyos, Quantum computation of discrete logarithms in semigroups, Journal of Mathematical Cryptology 8 (2014), 405-416.
  100. D. Chodounský, D. Repovs, L. Zdomskyy, Mathias forcing and combinatorial covering properties of filters, Journal of Symbolic Logic 80 (2015), 1398-1410.
  101. T. Chong, The empirical quest for p, Computers and Mathematics with Applications 56 (2008), 2772-2778.
  102. M. Chowdhury, An authentication scheme using non-commutative semigroups, IAS 3 (2007), 115-118.
  103. J. Cicho\'n, M. Kutylowski, Anonymity and k-choice identities, Lecture Notes in Computer Science 4990 (2008), 283-297.
  104. J. Climent, P. Navarro, L. Tortosa, An extension of the noncommutative Bergman's ring with a large number of noninvertible elements, Applicable Algebra in Engineering Communication and Computing 25 (2014), 347-361.
  105. J. Climent, P. Navarro, L. Tortosa, On the arithmetic of the endomorphisms ring End(\mathbbZp×\mathbbZp2), Applicable Algebra in Engineering Communication and Computing 22 (2011), 91-108.
  106. S. Cohen, S. Hasan, D. Panario, Q. Wang, An asymptotic formula for the number of irreducible transformation shift registers, Linear Algebra and its Applications 484 (2015), 46-62.
  107. M. Craven, D. Robertz, A parallel evolutionary approach to solving systems of equations in polycyclic groups, Groups Complexity Cryptology 8 (2016), 109-125.
  108. M. Craven, H. Jimbo, Evolutionary algorithm solution of the multiple conjugacy search problem in groups, and its applications to cryptography, Groups Complexity Cryptology 4 (2012), 135-165.
  109. L. Crone, L. Fishman, N. Hiers, S. Jackson, Equivalence of the Rothberger, k-Rothberger, and restricted Menger Games, Topology and its Applications (2019),.
  110. G. Cui, F. Hong, X. Tang, A public key encryption algorithm on braid groups, Journal of Software 18 (2007), 722-729.
  111. N. Damljanovi\'c, D. Djurci\'c, M. Zizovi\'c, Exponent of convergence for double sequences and selection principles, Filomat 31 (2017), 2821-2825.
  112. P. Das, Certain types of open covers and selection principles using ideals, Houston Journal of Mathematics 2013 (39), 2013 .
  113. P. Das, D. Chandra, Some further results on Ig and Igk-covers, Topology and its Applications 160 (2013), 2401-2410.
  114. P. Das, D. Chandra, U. Samanta, On certain variations of I-Hurewicz property, Topology and its Applications (2018), to appear.
  115. P. Das, U. Samanta, D. Chandra, On certain generalized versions of groupability, Topology and its Applications (2019),.
  116. P. Das, U. Samanta, D. Chandra, Some observations on Hurewicz and I-Hurewicz property, Topology and its Applications (2019),.
  117. S. Deb, B. Bhuyan, S. Hasan, Randomness analysis for multiple-recursive matrix generator, IACR Cryptology eprint 595 (2018).
  118. P. Dehornoy, Braid-based cryptography, Contemporary Mathematics 360 (2004), 5-33.
  119. P. Dehornoy, Using shifted conjugacy in braid-based cryptography, Contemporary Mathematics 418 (2006), 65-73.
  120. O. Delgado-Mohatar, A. Fúster-Sabater, Software implementation of cryptographic sequence generators over extended fields, Logic Journal of the IGPL 23 (2014), 73-87.
  121. O. Delgado-Mohatar, A. Fúster-Sabater, Software implementation of linear feedback shift registers over extended fields, Advances in Intelligent Systems and Computing 189 (2013), 117-126.
  122. F. Dellajustina, L. Martins, Could Archimedes have calculated p with sand and a stick?, Revista Brasileira de Ensino de Fisica 36 (2014), article 3305.
  123. F. Dellajustina, L. Martins, Poderia Arquimedes ter calculado p com areia e um bastão?, Revista Brasileira de Ensino de Física 36 (2014), 1-9.
  124. P. Derbez, A. Fouque, Automatic search of meet-in-the-middle and impossible differential attacks, Lecture Notes in Computer Science 9815 (2016), 157-184.
  125. M. Dewar, D. Panario, Linear transformation shift registers, IEEE Transactions on Information Theory 49 (2003), 2047-2052.
  126. M. Dewar, D. Panario, Mutual irreducibility of certain polynomials, Lecture Notes in Computer Science 2948 (2004), 59-68.
  127. G. Di-Maio, D. Djurci\'c, L. Kocinac, M. Zizovic, Statistical convergence, selection principles and asymptotic analysis, Chaos, Solitons & Fractals 42 (2009), 2815-2821.
  128. G. Di-Maio, L. Kocinac, A note on quasi-Menger and similar spaces, Topology and its Applications 179 (2015), 148-155.
  129. G. Di-Maio, L. Kocinac, Boundedness in topological spaces, Matematicki Vesnik 60 (2008), 137-148.
  130. G. Di-Maio, L. Kocinac, Some covering properties of hyperspaces, Topology and its Applications 155 (2008), 1959-1969.
  131. G. Di-Maio, L. Kocinac, Statistical convergence in topology, Topology and its Applications 156(2008), 28-45.
  132. R. Dias, Algebra, selections and additive Ramsey theory (survey), Bulletin of Symbolic Logic 24 2018 (179-180),.
  133. R. Dias, F. Tall, Indestructibility of compact spaces, Topology and its Applications 160 (2013), 2411-2426.
  134. R. Dias, M. Scheepers, Selective games on binary relations, Topology and its Applications 192 (2015), 58-83.
  135. B. Dickman, S. Epstein, Y. Wilamowsky, A historical note on the proof of the area of a circle, Journal of College Teaching and Learning 8 (2011), 1-6.
  136. I. Dinur, Improved differential cryptanalysis of round-reduced speck, Lecture Notes in Computer Science 8781 (2014), 147-164.
  137. I. Dinur, Linear equivalence of block ciphers with partial non-linear layers: Application to LowMC, IACR Cryptology eprint 772 (2018).
  138. D. Djurci\'c, L. Kocinac, M. Zizovi\'c, A few remarks on divergent sequences: Rates of divergence, Journal of Mathematical Analysis and Applications 360 (2009), 588-598.
  139. D. Djurci\'c, L. Kocinac, M. Zizovi\'c, Classes of sequences of real numbers, games and selection properties, Topology and its Applications 156 (2008), 46-55.
  140. D. Djurci\'c, L. Kocinac, M. Zizovic, On Selection Principles and Games in Divergent Processes, in: Selection Principles and Covering Properties in Topology (L. Kocinac, ed.), Quaderni di Matematica 18 (2007), 133-155.
  141. D. Djurci\'c, L. Kocinac, M. Zizovic, Rapidly varying sequences and rapid convergence, Topology and its Applications 155 (2008), 2143-2149.
  142. D. Djurci\'c, L. Kocinac, M. Zizovic, Relations between sequences and selection properties, Abstarct and Applied Analysis 2007 (2007), Article 43081.
  143. D. Djurci\'c, M. Zizovic, A. Petojevi\'c, Note on selection principles of Kocinac, Filomat 26 (2012), 1291-1295.
  144. C. Dobraunig, M. Eichlseder, F. Mendel, Higher-order cryptanalysis of LowMC, Lecture Notes in Computer Science 9558 (2016), 87-101.
  145. A. Dow, p-Weight and the Fréchet-Urysohn property, Topology and its Applications 174 (2014), 56-61.
  146. H. Duanmu, F. Tall, L. Zdomskyy, Productively Lindelöf and indestructibly Lindelöf spaces, Topology and its Applications 160 (2013), 2443-2453.
  147. M. Eftekhari, Cryptanalysis of some protocols using matrices over group rings, Lecture Notes in Computer Science 10239 (2017), 223-229.
  148. A. El-Atik, New types of winning strategies via compact spaces, Journal of the Egyptian Mathematical Society, to appear.
  149. E. El-Mahassni, A. Winterhof, On the distribution and linear complexity of counter-dependent nonlinear congruential pseudorandom number generators, JP Journal of Algebra, Number Theory and Applications 6 (2006), 411-423.
  150. E. El-Mahassni, D. Gomez, On the distribution of counter-dependent nonlinear congruential pseudorandom number generators in residue rings, International Journal of Number Theory 4 (2008), 1009-1018.
  151. M. Elekes, T. Mátrai, L. Soukup, On splitting infinite-fold covers, Fundamenta Mathematicae 212 (2011), 95-127.
  152. I. Elishakoff, E. Pines, Do scripture and mathematics agree on the Number p?, B'Or Ha'Torah 17 (2007), 133-153.
  153. A. Elyahyaoui, M. Elkettani, Fully homomorphic encryption: state of art and comparison, International Journal of Computer Science and Information Security 14 (2016), 159-167.
  154. A. Elyahyaoui, M. Elkettani, Optimizations in Fully Homomorphic Encryption, CloudTech (2018).
  155. A. Eysen, S. Özçag, Almost Menger property in bitopological spaces, Ukrainian Mathematical Journal 68 (2016), 950-958.
  156. A. Eysen, S. Özçag, Weaker forms of the Menger property in bitopological spaces, Quaestiones Mathematicae 41 2018 (1-12),.
  157. H. Fan, C. Guohua, W. Xiaofei, T. Xueming, New public key cryptosystems from combinatorial group theory, Wuhan University Journal of Natural Sciences 11 (2006), 1267-1270.
  158. A. Fan, J. Jia, J. Liu, S. Mao, H. Wang, H. Zhang, Cryptanalysis of public key cryptosystems based on non-Abelian factorization problems, Tsinghua Science and Technology 21 (2016), 344-351.
  159. S. Fan, W. Han, Y. Yang, G. Zeng, On the properties of the minimal polynomial of s-LFSR sequence, Journal of Electronics and Information Technology 32 (2010), 737-741.
  160. S. Fan, W. Han, Y. Yang, G. Zeng, Primitive polynomials and word oriented linear feedback shift registers, Journal on Communications 30 (2009), 111-116.
  161. V. Farmaki, D. Karageorgos, A. Koutsogiannis, A. Mitropoulos, Abstract topological Ramsey theory for nets, Topology and its Applications 201 (2016), 314-329.
  162. V. Farmaki, D. Karageorgos, A. Koutsogiannis, A. Mitropoulos, Topological Dynamics on Nets, Topology and its Applications (2015), to appear.
  163. Z. Feng, P. Gartside, Minimal size of basic families, Topology and its Applications 158 (2011), 1124-1130.
  164. J. Ferrando, J. Kakol, M. López-Pellicer, Spaces C(X) with ordered bases, Topology and its Applications 208 (2016), 30-39.
  165. M. Ferrer, M. Gary, S. Hernández, Representation of group isomorphisms: The compact case, Journal of Function Spaces 2015 2015 (Article 879414),.
  166. R. Filipów, N. Mroszek, I. Recaw, P. Szuca, Ideal version of Ramsey's Theorem, Czechoslovak Mathematics Journal 61 (2011), 289-308.
  167. E. Frenkel, A. Myasnikov, V. Remeslennikov, Regular sets and counting in free groups, Trends in Mathematics (2010), 93-118.
  168. P. Freyre, N. Díaz, R. Díaz, C. Pérez, Random generation of MDS matrices, Current Trends in Cryptology (CTCrypt) 3 (2019).
  169. T. Fun, A. Samsudin, A survey of homomorphic encryption for outsourced big data computation, SII Transactions on Internet and Information Systems 10 (2016), 3826-3851.
  170. S. Gabriyelyan, Topological properties of function spaces Ck(X,2) over zero-dimensional metric spaces X, Topology and its Applications 209 (2016), 335-346.
  171. S. Gabriyelyan, J. Kakol, Free locally convex spaces with a small base, Revista de la Real Academia de Ciencias Exactas, Fisicas y Naturales (2016),.
  172. S. Gabriyelyan, J. Kakol, Metrization conditions for topological vector spaces with Baire type properties, Topology and its Applications 173 (2014), 135-141.
  173. S. Gabriyelyan, J. Kakol, On P-spaces and related concepts, Topology and its Applications 191 (2015), 178-198.
  174. S. Gabriyelyan, J. Kakol, On topological spaces and topological groups with certain local countable networks, Topology and its Applications 190 (2015), 59-73.
  175. S. Gabriyelyan, J. Kakol, A. Leiderman, On topological groups with a small base and metrizability, Fundamenta Mathematicae 229 (2015), 129-158.
  176. S. Gabriyelyan, J. Kakol, A. Leiderman, The strong Pytkeev property for topological groups and topological vector spaces, Monatshefte für Mathematik 175 (2014), 519-542.
  177. F. Galvin, M. Scheepers, Borel's Conjecture in Topological Groups, Journal of Symbolic Logic 78 (2013), 168-184.
  178. F. Galvin, M. Scheepers, Borel's Conjecture in topological groups, Journal of Symbolic Logic Volume 78 (2013), 168-184.
  179. Y. Gao, Y. Cao, On the arithmetic of the endomorphism ring \mathbbZp[x]á[`f](x)ñ×\mathbbZp2[x]áf (x)ñ), Applicable Algebra in Engineering Communication and Computing 26 (2015), 305-316.
  180. F. Gao, Y. Yang, N. Zhang, X. Liu, Calculation for the linear complexity of primitive s-LFSR sequences, CSQRWC 2 (2011), 917-919.
  181. D. Garber, Braid Group Cryptography, Lecture Notes Series-Institute for Mathematical Sciences-National University of Singapore 19 (2009), 329-416.
  182. D. Garber, D. Kahrobaei, H. Lam, Length-based attacks in polycyclic groups, Journal of Mathematical Cryptology 9 (2015), 33-43.
  183. D. Gauld, Selections and metrisability of manifolds, Topology and its Applications 160 (2013), 2473-2481.
  184. V. Gebhardt, Conjugacy search in braid groups from a braid-based cryptography point of view, Applicable Algebra in Engineering Communication and Computing 17 (2006), 219-238.
  185. M. Ghaffari, Z. Mostaghim, Distance in Cayley graphs on permutation groups generated by k m-cycles, Transactions on Combinatorics 6 (2017), 45-59.
  186. M. Ghaffari, Z. Mostaghim, More secure version of a Cayley hash function, Groups Complexity Cryptology, to appear.
  187. S. Ghorpade, S. Ram, Block companion Singer cycles, primitive recursive vector sequences, and coprime polynomial pairs over finite fields, Finite Fields and Their Applications 17 (2011), 461-472.
  188. S. Ghorpade, S. Ram, Enumeration of splitting subspaces over finite fields, Contemporary Mathematics 574 (2012), 49-58.
  189. R. Gilman, A. Miasnikov, A. Myasnikov, A. Ushakov, New developments in Commutator Key Exchange, Proceedings of the First International Conference on Symbolic Computation and Cryptography (J.C. Faugére and D. Wang, eds.) 1 (2008), 146-150.
  190. R. Gilman, A. Miasnikov, D. Osin, Exponentially generic subsets of groups, Illinois Journal of Mathematics 54 (2010), 371-388.
  191. R. Gilman, A. Myasnikov, V. Roman'kov, Random equations in free groups, Groups Complexity Cryptology 3 (2011), 257-284.
  192. R. Gilman, A. Myasnikov, V. Roman'kov, Random equations in nilpotent groups, Journal of Algebra 352 (2012), 192-214.
  193. O. Goldreich, S. Goldwasser, A. Nussboim, On the implementation of huge random objects, Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science - FOCS03 (2003), 68.
  194. O. Goldreich, S. Goldwasser, A. Nussboim, On the implementation of huge random objects, Siam Journal on Computing 39 (2010), 2761-2822.
  195. M. Goltvanitsa, Digit sequences of skew linear recurrences of maximal period over Galois rings, Mathematical Aspects of Cryptography 6 (2015), 19-27.
  196. M. Goltvanitsa, Equidistant filters based on skew ML-sequences over fields, Mathematics and Cryptography (in Russian) 9 ( 2018), 71-86.
  197. M. Goltvanitsa, Equidistant filters based on skew ML-sequnces over fields, Current Trends in Cryptography (2017), to appear.
  198. D. Gomez, Multiplicative character sums with counter-dependent nonlinear congruential pseudorandom number generators, Lecture Notes in Computer Science 6338 (2010), 188-195.
  199. M. González-Vasco, R. Steinwandt, Group Theoretic Cryptography, CRC Press (2015).
  200. J. Gonzalez-Meneses, Improving an algorithm to solve multiple simultaneous conjugacy problems in braid groups, Contemporary Mathematics 372 (2005), 35-42.
  201. A. Groch, D. Hofheinz, R. Steinwandt, A practical attack on the root problem in braid groups, Contemporary Mathematics 418 (2006), 121-131.
  202. G. Gruenhage, Generalized metrizable spaces, Recent Progress in General Topology III Atlantis Press, 2014.
  203. G. Gruenhage, P. Nyikos, Mary Ellen's conjectures, Topology and its Applications 195 (2015), 15-25.
  204. J. Gryak, D. Kahrobaei, The Status of polycyclic group-based cryptography: a survey and open problems, Groups Complexity Cryptology 8 (2016), 171-186.
  205. G. Han, C. Ma, A new authentication and signature scheme based on the conjugacy search problem, NSWCTC 2 (2010), 317-320.
  206. W. Han, K. He, G. Zeng, A trinomial type of s-LFSR oriented toward software implementation, Science in China, Series F: Information Sciences 50 (2007), 359-372.
  207. W. Han, K. He, M. Zhang, G. Zeng, Trace representation of primitive s-LFSR sequences and its application, Journal of Electronics and Information Technology 31 (2009), 942-945.
  208. W. Han, X. Liu, G. Zeng, Research on linear complexity of primitive s-LFSR sequences, Journal of Electronics and Information Technology 31 (2009), 2897-2900.
  209. D. Hart, D. Kim, G. Micheli, G. Perez, C. Petit, Y. Quek, A Practical Cryptanalysis of WalnutDSATM, PKC (2018).
  210. S. Hasan, D. Panario, Q. Wang, Word-oriented transformation shift registers and their linear complexity, Lecture Notes in Computer Science 7280 (2012), 190-201.
  211. S. Hasan, D. Panario, W. Qiang, Nonlinear vectorial primitive recursive sequences, Cryptography and Communications (2017).
  212. Z. He, J. Huang, W. Pei, K. Wang, J. Zhou, Secure communication scheme based on asymptotic model of deterministic randomness, Physics Letters A 358 (2006), 283-288.
  213. P. Hecht, Post-Quantum Cryptography: Generalized ElGamal cipher over GF(2518), Theoretical and Applied Informatics 28 (2016).
  214. P. Hecht, Post-Quantum Cryptography: S381 Cyclic Subgroup of High Order, International Journal of Advanced Engineering Research and Science 4 (2017), 78-86.
  215. P. Hecht, Zero-Knowledge proof authentication using left self distributive systems: A post-quantum approach, VIII Congreso Iberoamericano de Seguridad Informatica CIBSI'15 (2015),.
  216. H. Helfgott, Á. Seress, A. Zuk, Random generators of the symmetric group: Diameter, mixing time and spectral gap, Journal of Algebra 421 (2015), 349-368.
  217. R. Hernández-Gutiérrez, P. Szeptycki, Some observations on filters with properties defined by open covers, Commentationes Mathematicae Universitatis Carolinae 56 (2015), 355-364.
  218. M. Hrusak, Almost disjoint families and topology, Recent Progress in General Topology III Atlantis Press, 2014.
  219. M. Hrusak, U. Ramos-Garcia, Malykhin's Problem, Advances in Mathematics 262 (2014), 193-212.
  220. M. Hrusak, U. Ramos-Garcia, Precompact Fréchet topologies on Abelian groups, Topology and its Applications 159 (2012), 3605-3613.
  221. Y. Hu, B. Wang, Signature scheme based on the root extraction problem over braid groups, IET Information Security 3 (2009), 53-59.
  222. Y. Hu, Z. Hu, Y. Liu, F. Wang, An efficient algorithm for the generation of the generalized self-shrinking sequence, Proceedings of the 11th Joint International Computer Conference (2005), 163-166.
  223. S. Iswariya, A. Rishivarman, A Non-abelian group Cryptography, International Journal of Modern Science and Technology 1 (2016), 300-303.
  224. S. Iswariya, A. Rishivarman, An arithmetic technique for non-abelian group cryptosystem, International Journal of Computer Applications 161 (2017), 32-35.
  225. A. Jabri, K. Shehri, Analysis of counter aided LFSR based cryptosystems, ICMSAO 1 (2005), 1-3.
  226. Y. Javed, A. Khan, A. Qahar, J. Abdullah, EEoP: A Lightweight Security Scheme over PKI in D2D Cellular Networks, 9 2017 (99-105),.
  227. J. Jia, J. Liu, H. Zhang, Cryptanalysis of Cryptosystems Based on General Linear Group, China Communications 13 (2016), 217-224.
  228. J. Jia, J. Liu, H. Zhang, Cryptanalysis of schemes based on pseudoinverse matrix, Wuhan University Journal of Natural Sciences 21 (2016), 209-213 .
  229. J. Jia, J. Liu, S. Mao, H. Wang, W. Wu, H. Zhang, Cryptanalysis of HKKS key exchange protocols, Chinese Journal of Computers 39 (2016), 516-528.
  230. Y. Jian, Y. Qiuhua, Y. Ruming, W. Xiqin, S. Xiuming, Discretization of coupled map lattices for a stream cipher, Tsinghua Science and Technology 16 (2011), 241-246.
  231. Y. Jiang, J. Yang, On the number of irreducible linear transformation shift registers, Designs, Codes, and Cryptography 83 (2017), 445-454.
  232. F. Jordan, There are no hereditary productive g-spaces, Topology and its Applications 155 (2008), 1786-1791.
  233. M. Kada, Covering a bounded set of functions by an increasing chain of slaloms, Topology and its Applications 154 (2007), 277-281.
  234. D. Kahrobaei, C. Koupparis, Non-commutative digital signatures, Groups Complexity Cryptology 4 (2012), 377-384.
  235. D. Kahrobaei, H. Lam, Heisenberg Groups as Platform for the AAG key-exchange protocol, International Conference on Network Protocols 6980444 (2014), 660-664.
  236. A. Kalka, Non-associative public-key cryptography, Contemporary Mathematics, available online.
  237. A. Kalka, Representation attacks on the braid Diffie-Hellman public key encryption, Applicable Algebra in Engineering Communication and Computing 17 (2006), 257-266.
  238. A. Kalka, E. Liberman, M. Teicher, A note on the shifted conjugacy problem in braid groups, Groups Complexity Cryptology 1 (2009), 227-230.
  239. A. Kalka, M. Teicher, Non-associative key establishment for left distributive systems, Groups Complexity Cryptology 5 (2013), 169-191.
  240. M. Kambites, Generic properties of finitely presented monoids and semigroups, Computational Complexity 20 (2011), 21-50.
  241. V. Katz, M. Folkerts, B. Hughes, R. Wagner, J. Berggren, Sourcebook in the Mathematics of Medieval Europe and North Africa, Princeton University Press (2016).
  242. M. Khan, L. Kocinac, A. Sabaha, Covering properties defined by semi-open sets, Journal of Nonlinear Sciences and Applications 9 (2016), 4388-4398.
  243. K. Ko, J. Lee, T. Thomas, Towards generating secure keys for braid cryptography, Designs, Codes, and Cryptography 45 (2007), 317-333.
  244. L. Kocinac, ai-selection principles and games, Contemporary Mathematics 533 (2011), 107-124.
  245. L. Kocinac, Generalized Ramsey Theory and topological properties: A survey, Rendiconti del Seminario Matematico di Messina, Serie II 9 (2003), 119-132.
  246. L. Kocinac, On mildly Hurewicz spaces, International Mathematical Forum 11 (2016), 573-582.
  247. L. Kocinac, Selected results on selection principles, in: Proceedings of the 3rd Seminar on Geometry and Topology (Sh. Rezapour, ed.) (2004), 71-104.
  248. L. Kocinac, Selection principles and continuous images, Cubo Mathematical Journal 8 (2006), 23-31.
  249. L. Kocinac, Selection principles in hyperspaces, in: Selection Principles and Covering Properties in Topology (L. Kocinac, ed.), Quaderni di Matematica 18 (2006), 157-194.
  250. L. Kocinac, Selection principles related to ai-properties, Taiwanese Journal of Mathematics 12 (2008), 561-571.
  251. L. Kocinac, Some Remarks on Paratopological Groups, Filomat 30 (2016), 823-830.
  252. L. Kocinac, Some covering properties in topological and uniform spaces, Proceedings of the Steklov Institute of Mathematics 252 (2006), 134-149.
  253. L. Kocinac, Star selection principles: A survey, Khayyam Journal of Mathematics 1 2015 (82-106),.
  254. L. Kocinac, Some remarks on topologized groups, Filomat 30 (2016), 823-830.
  255. L. Kocinac, D. Djurci\'c, J. Manojlovi\'c, Regular and rapid variations and some applications, Mathematical Analysis and Applications (2018).
  256. L. Kocinac, H. Künzi, Selection properties of uniform and related structures, Topology and its Applications 160 (2013), 2495-2504.
  257. L. Kocinac, S. Özçag, Hurewicz-type properties in texture structures, Topology and its Applications 221 (2017), 286-299.
  258. L. Kocinac, S. Özçag, Selection properties of texture structures, Topology and its Applications 192 (2015), 158-168.
  259. D. Kocev, Menger-type covering properties of topological spaces, Filomat 29 (2015), 99-106.
  260. D. Kocev, On weaker forms of relator Menger, relator Rothberger and relator Hurewicz properties, Filomat 26 (2012), 427-437.
  261. D. Kocev, Selection principles in relator spaces, Acta Mathematica Hungarica 126 (2010), 78-93.
  262. O. Kolman, B. Wald, M-slenderness, Israel Journal of Mathematics 217 (2017), 303-312.
  263. M. Kotov, A. Menshov, A. Ushakov, Attack on Kayawood protocol: uncloaking private keys, IACR Cryptology eprint 604 (2018).
  264. M. Kotov, D. Panteleev, A. Ushakov, Analysis of secret sharing schemes based on Nielsen transformations, Groups Complexity Cryptology, to appear.
  265. H. Krawczyk, Cryptographic extraction and key derivation: The HKDF scheme, Lecture Notes in Computer Science 6223 (2010), 631-648.
  266. S. Krishnaswamy, H. Pillai, On the number of Linear Feedback Shift Registers with a special structure, IEEE Transactions on Information Theory 58 (2012), 1783-1790.
  267. T. Krovetz, P. Rogaway, The software performance of authenticated-encryption modes, Lecture Notes in Computer Science 6733 (2011), 306-327.
  268. A. Kucharski, Universally Kuratowski-Ulam space and open-open games, Annales Mathematicae Silesianae 29 (2015), 85-92.
  269. G. Kumar, H. Saini, Novel noncommutative cryptography scheme using extra special group, Security and Communication Networks 2017 (2017), Article 9036382.
  270. V. Kumar, K. Ross, A. Singh, Ramsey theory for hypergroups, ArXiv eprint (2018).
  271. Y. Kurt, A new key agreement scheme based on the triple decomposition problem, International Journal of Network Security 16 (2014), 426-436.
  272. A. Kwela, Ideal weak QN-spaces, Topology and its Applications 240 (2018), 98-115 .
  273. M. López-Pellicer, S. Moll, Some aspects in the mathematical work of Jerzy Kakol, Springer Proceedings in Mathematics and Statistics 80 (2014), 1-26.
  274. G. Leander, B. Minaud, S. Ronjom, A generic approach to invariant subspace attacks: Cryptanalysis of Robin, iSCREAM and Zorro, Lecture Notes in Computer Science 9056 (2015), 254-283.
  275. E. Lee, Braid groups in cryptology, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E87-A (2004), 986-992.
  276. A. Leiderman, V. Pestov, A. Tomita, On topological groups admitting a base at the identity indexed by ww, Fundamenta Mathematicae 238 (2017), 79-100.
  277. T. Lengyel, Asymptotics for lacunary sums of binomial coefficients and a card problem with ranks, Journal of Inequalities in Pure and Applied Mathematics 8 (2007), 07.7.2.
  278. L. Lesser, Book of Numbers: Exploring Jewish mathematics and culture at a Jewish high school, Journal of Mathematics and Culture 1 (2006), 8-31.
  279. K. Lewi, W. Kim, I. Maykov, S. Weis, Securing update propagation with homomorphic hashing, IACR Cryptology eprint 227 (2019).
  280. Z. Li, The quasi-Rothberger property of linearly ordered spaces, Topology and its Applications 247 (2018), 41-49.
  281. G. Li, H. Lin, X. Wang, L. Yang, Groups with two generators having unsolvable word problem and presentations of Mihailova subgroups of braid groups, Communications in Algebra 44 (2016), 3020-3037.
  282. T. Lin, A study of non-abelian public key cryptography, International Journal of Network Security 20 (2018), 278-290.
  283. P. Lipparini, A characterization of the Menger property by means of ultrafilter convergence, Topology and its Applications 160 (2013), 2505-2513.
  284. X. Liu, H. Liu, P. Hu, On the Arithmetic of Endomorphism Ring End (Zp×Zpm), Wuhan University Journal of Natural Sciences 23 (2018), 277-282.
  285. J. Liu, H. Zhang, J. Jia, A linear algebra attack on the non-commuting cryptography class based on matrix power function, Lecture Notes in Computer Science 10143 (2017), 343-354.
  286. J. Liu, H. Zhang, J. Jia, Cryptanalysis of schemes based on polynomial symmetrical decomposition, Chinese Journal of Electronics 26 (2017), 1139-1146.
  287. J. Liu, H. Zhang, J. Jia, H. Wang, S. Mao, W. Wu, Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem, Science China Information Science 59 (2016), 1-11.
  288. J. Liu, J. Jia, H. Zhang, R. Yu, Y. Yu, W. Wu, Cryptanalysis of a cryptosystem with non-commutative platform groups, China Communications 15 (2018), 2018 .
  289. J. Liu, Y. Yu, B. Yang, J. Jia, S. Wang, H. Wang , Structural key recovery of simple matrix encryption scheme family, The Computer Journal bxy093 (2018).
  290. X. Liua, S. Lin, On spaces defined by Pytkeev networks, Filomat 32 (2018), 6115-6129.
  291. Y. Luo, W. Qi, On the algebraic structure of Klimov-Shamir T-function, Tongxin Xuebao/Journal on Communication 29 (2008), 143-148.
  292. S. Maffre, A weak key test for braid based cryptography, Designs, Codes, and Cryptography 39 (2006), 347-373.
  293. M. Malliaris, S. Shelah, Cofinality spectrum theorems in model theory, set theory and general topology, Journal of the American Mathematical Society 29 (2016), 237-297.
  294. F. Matucci, Cryptanalysis of the Shpilrain-Ushakov protocol for Thompson's group, Journal of Cryptology 21 (2008), 458-468.
  295. N. May, S. Spadaro, P. Szeptycki, A new class of spaces with all finite powers Lindelöf, Topology and its Applications 170 (2014), 104-118.
  296. H. Mildenberger, Cardinal characteristics for Menger-bounded subgroups, Topology and its Applications 156 (2008), 130-137.
  297. H. Mildenberger, On the groupwise density number for filters, Acta Universitatis Carolinae - Mathematica et Physica 46 (2005), 55-63.
  298. H. Mildenberger, S. Shelah, The Near Coherence of Filters principle does not imply the Filter Dichotomy principle, Transactions of the American Mathematical Society 361 (2009), 2305-2317.
  299. H. Mildenberger, S. Shelah, The minimal cofinality of an ultrapower of w and the cofinality of the symmetric group can be larger than \mathfrakb+, Journal of Symbolic Logic 76 (2011), 1322-1340.
  300. A. Miller, A hodgepodge of sets of reals, Note di Matematica 27 (2007), 25-39.
  301. A. Miller, A nonhereditary Borel-cover g-set, Real Analysis Exchange 29 (2003/4), 601-606.
  302. A. Miller, The g-Borel conjecture, Archive for Mathematical Logic 44 (2005), 425-434.
  303. A. Miller, The cardinal characteristic for relative g-sets, Topology and its Applications 156 (2009), 872-878.
  304. H. Molland, T. Helleseth, A linear weakness in the Klimov-Shamir T-function, International Symposyum on Information Theory ISIT (2005), 1106-1110.
  305. N. Mosina, A. Ushakov, Mean-Set Attack: Cryptanalysis of Sibert et al. authentication protocol, Journal of Mathematical Cryptology 4 (2010), 149-174.
  306. S. Mostafa, H. Saad, M. Jaber, M. Ali, K. Dhafer, The design trends of keystream generator for stream cipher for high immunity attacks, Lecture Notes in Electrical Engineering 362 (2015), 877-889.
  307. M. Mrsevi\'c, M. Jeli\'c, Selection principles in hyperspaces with generalized Vietoris topologies, Topology and its Applications 156 (2008), 124-129.
  308. M. Mrsevi\'c, M. Jeli\'c, Selection principles, g-sets and ai-properties in Cech closure spaces, Topology and its Applications 155 (2008), 1947-1958.
  309. A. Myasnikov, A. Ushakov, Cryptanalysis of matrix conjugation schemes, Journal of Mathematical Cryptology 8 (2014), 95-114.
  310. A. Myasnikov, A. Ushakov, Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux key agreement protocol, Groups Complexity Cryptology 1 (2009), 63-75.
  311. A. Myasnikov, A. Ushakov, Length based attack and braid groups: Cryptanalysis of Anshel-Anshel-Goldfeld key exchange protocol, Lecture Notes in Computer Science 4450 (2007), 76-88.
  312. A. Myasnikov, A. Ushakov, Random subgroups and analysis of the length-based and quotient attacks, Journal of Mathematical Cryptology 2 (2008), 29-61.
  313. A. Myasnikov, V. Roman'kov, A linear decomposition attack, Groups Complexity Cryptology 7 (2015), 81-94.
  314. A. Myasnikov, V. Shpilrain, A. Ushakov, A practical attack on a braid group based cryptographic protocol, Lecture Notes in Computer Science 3621 (2005), 86-96.
  315. A. Myasnikov, V. Shpilrain, A. Ushakov, Group-Based Cryptography, Advanced Courses in Mathematics CRM Barcelona (2008), Birkhäuser.
  316. A. Myasnikov, V. Shpilrain, A. Ushakov, Random subgroups of Braid groups: An approach to cryptanalysis of a braid group based cryptographic protocol, Lecture Notes in Computer Science 3958 (2006), 302-314.
  317. J. Naidu, J. Sanford, Some comments on: A historical note on the proof of the area of a circle, American Journal of Business Education 4 (2011), 45-50.
  318. M. Naor, O. Reingold, Constructing pseudo-random permutations with a prescribed structure, Journal of Cryptology 15 (2002), 97-102.
  319. M. Naor, O. Reingold, Constructing pseudo-random permutations with a prescribed structure, Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms (2001), 458-459.
  320. M. Nasution, Fuzzy braid group: A concept, Journal of Physics Conference Series 1116 2018 (022032),.
  321. S. Nepal, N. Li, D. Liu, Lightweight mutual authentication for IoT and its applications, IEEE Transactions on Sustainable Computing PP (2017, 1),.
  322. S. Neves, F. Araujo, Engineering nonlinear pseudorandom number generators, Lecture Notes in Computer Science 8384 (2014), 96-105.
  323. N. Noble, Some thoughts on countable Lindelöf products, Topology and its Applications (2019).
  324. Y. Oda, K. Tamano, The Pytkeev property of a subspace of a product of countably many Lasnev spaces, Topology and its Applications 231 (2017), 316-319.
  325. A. Osipov, On the different kinds of separability of the space of Borel functions, Open Mathematics 16 (2018), 740–-746.
  326. A. Osipov, The application of selection principles to study of properties of functional spaces, Acta Mathematica Hungarica 154 (2018), 362-377.
  327. A. Osipov, The functional characterizations of the Rothberger and Menger properties, Topology and its Applications (2018), to appear.
  328. A. Osipov, S. Özçag, Variations of selective separability and tightness in function spaces with set-open topologies, Topology and its Applications 217 (2017), 38-50.
  329. B. Pansera, Weaker forms of the Menger property, Quaestiones Mathematicae 35 (2012), 161-169.
  330. G. Paolini, S. Shelah, On a cardinal invariant related to the Haar Measure Problem, ArXiv eprint, 1809.10442.
  331. J. Parriaux, P. Guillot, G. Millérioux, Synchronization of boolean dynamical systems: a spectral characterization, SETA (2010), 373-386.
  332. J. Partala, Algebraic generalization of Diffie-Hellman key exchange, Journal of Mathematical Cryptology (2017).
  333. J. Partala, Left conjugacy closed left quasigroups with pairwise distinct left translations, JP Journal of Algebra, Number Theory and Applications 38 (2016), 95-108.
  334. A. Pavlovi\'c, Local function versus local closure function in ideal topological spaces, Filomat 30 (2016), 3725-3731.
  335. A. Pavlovi\'c, Variations on a theorem of Arhangel'skii and Pytkeev, Acta Mathematica Hungarica 131 (2011), 295-306.
  336. C. Petit, J. Quisquater, Rubik's for cryptographers, Notices of the American Mathematical Society 61 (2013), 703-709.
  337. L. Pilato, G. Meoni, L. Fanucci, Design optimization for high throughput recursive systematic convolutional encoders, ICSTCC 22 (2018), 806-809.
  338. R. Pol, F. Smentek, Note on reflexivity of some spaces of continuous integer-valued functions, Journal of Mathematical Analysis and Applications 395 (2012), 251-257.
  339. R. Pol, A homeomorphism between strong measure zero sets whose graph is not of strong measure zero, Topology and its Applications 157 (2010), 1506-1509.
  340. E. Pol, R. Pol, On metric spaces with the Haver property which are Menger spaces, Topology and its Applications 157 (2010), 1495-1505.
  341. M. Prasad, Secure authentication scheme for Long Term Evolution - Advanced, International Journal of Applied Engineering Research 9 (2013), 11-15.
  342. M. Prasad, R. Manoharan, Digitally secured authentication scheme in long term evolution -– advanced, International Journal of Applied Engineering Research 9 (2014), 21807-21821.
  343. S. Ram, Enumeration of linear transformation shift registers, Designs, Codes, and Cryptography 75 (2014), 301-314.
  344. S. Rasoolzadeh, Z. Ahmadian, M. Salmasizadeh, M. Aref, Total break of Zorro using linear and differential attacks, The ISC International Journal of Information Security 6 (2014), 23-34.
  345. C. Rechberger, H. Soleimany, T. Tiessen, Cryptanalysis of low-data instances of full LowMCv2, IACR Transactions on Symmetric Cryptology 2018, 163-181.
  346. J. Renshaw, Actions of E-dense semigroups and an application to the discrete log problem, , ArXiv eprint.
  347. J. Renshaw, Completely regular semigroups and the Discrete Log Problem, , ArXiv eprint.
  348. D. Repovs, L. Zdomskyy, On M-separability of countable spaces and function spaces, Topology and its Applications 157 (2010), 2538-2541.
  349. D. Repovs, L. Zdomskyy, On the Menger covering property and D-spaces, Proceedings of the American Mathematical Society 140 (2012), 1069-1074.
  350. D. Repovs, L. Zdomskyy, Productively Lindelöf spaces and the covering property of Hurewicz, Topology and its Applications 169 (2014), 16-20.
  351. D. Repovs, L. Zdomskyy, Products of H-separable spaces in the Laver model, Topology and its Applications 239 (2018), 115-119.
  352. D. Repovs, L. Zdomskyy, Products of Hurewicz spaces in the Laver model, Bulletin of Symbolic Logic 23 (2017), 324-333.
  353. D. Repovs, L. Zdomskyy, S. Zhang, Countable dense homogeneous filters and the Menger covering property, Fundamenta Mathematicae 224 (2014), 233-240.
  354. E. Reznichenko, Stratifiability of Ck(X) for a class of separable metrizable X, Topology and its Applications 155 (2008), 2060-2062.
  355. V. Roman'kov, A nonlinear decomposition attack, Groups Complexity Cryptology 8 (2016), 197-207.
  356. V. Roman'kov, Cryptanalysis of a combinatorial public key cryptosystem, Groups Complexity Cryptology 9 (2017), 125-135.
  357. V. Roman'kov, Two general schemes of algebraic cryptography, Groups Complexity Cryptology 10 (2018), 83-98.
  358. K. Ross, A. Singh, Ramsey theory for hypergroups, Semigroup Forum (2019),.
  359. A. Sabah, M. Khan, L. Kocinac, Covering properties defined by semi-open sets, Journal of Nonlinear Science and Applications 9 (2016), 4388-4398.
  360. M. Sakai, Function spaces with a countable cs*-network at a point, Topology and its Applications 156 (2008), 117-123.
  361. M. Sakai, Menger subsets of the Sorgenfrey line, Proceedings of the American Mathematical Society 137 (2009), 3129-3138.
  362. M. Sakai, Remarks on the Menger property of Cp(X, 2), Topology and its Applications (2019),.
  363. M. Sakai, Some weak covering properties and infinite games, Central European Journal of Mathematics 12 (2014), 322-329.
  364. M. Sakai, Special subsets of reals characterizing local properties of function spaces, in: Selection Principles and Covering Properties in Topology (L. Kocinac, ed.), Quaderni di Matematica 18 (2007), 195-225.
  365. M. Sakai, Star versions of the Menger property, Topology and its Applications 176 (2014), 22-34.
  366. M. Sakai, The Ramsey property for Cp(X), Acta Mathematica Hungarica 128 (2010), 96-105.
  367. M. Sakai, The projective Menger property and an embedding of Sw into function spaces, Topology and its Applications 220 (2017), 118-130.
  368. M. Sakai, The sequence selection properties of Cp(X), Topology and its Applications 154 (2007), 552-560.
  369. M. Sakai, Two properties of Cp(X) weaker than the Fréchet Urysohn property, Topology and its Applications 153 (2006), 2795-2804.
  370. M. Sakai, M. Scheepers, The combinatorics of open covers, Recent Progress in General Topology III Atlantis Press, 2014.
  371. M. Scheepers, Gerlits and function spaces, Studia Scientiarum Mathematicarum Hungarica 47 (2010), 529-557.
  372. M. Scheepers, Rothberger bounded groups and Ramsey theory, Topology and its Applications 158 (2011), 1575-1583.
  373. M. Scheepers, Rothberger's property in all finite powers, Topology and its Applications 156(2008), 93-103.
  374. M. Scheepers, Selection principles and Baire spaces, Matematicki Vesnik 61 (2009), 195-202.
  375. M. Scheepers, Selection principles and Sierpinski sets, Acta Mathematica Sinica - English Series 23 (2007), 1153-1162.
  376. M. Scheepers, Selection principles and covering properties in topology, Note di Matematica 22 (2003), 3-41.
  377. M. Scheepers, Selection principles in Topology: New Directions, Filomat 15 (2001), 111-126.
  378. M. Scheepers, Topological games and Ramsey theory, in: Open Problems in Topology II (E. Pearl, ed.) (2007), 61-90.
  379. M. Scheepers, F. Tall, Errata to "Lindelöf indestructibility, topological games and selection principles", Fundamenta Mathematicae 224 (2014), 203-204.
  380. M. Scheepers, F. Tall, Lindelöf indestructibility, topological games and selection principles, Fundamenta Mathematicae 210 (2010), 1-46.
  381. M. Shah, A. Wahab, Fuzzy selection principle, European Journal of Scientific Research 56 (2011), 496-503.
  382. M. Shah, A. Wahab, Gradation of Selection Principle, European Journal of Scientific Research 61 (2011), 390-400 .
  383. X. Shan, X. Wang, Q. Yang, R. Yin, J. Yuan, A stream cipher based on discretized spatiotemporal chaotic system, International Conference on Information Science and Engineering (2009).
  384. H. Sharma, Matlab implementation of algorithm for generating multisequences, International Journal Of Science and Technoledge 2 (2014), 315-324.
  385. I. Shparlinski, A. Winterhof, On the discrepancy and linear complexity of some counter-dependent recurrence sequences, Lecture Notes in Computer Science 4086 (2006), 295-303.
  386. V. Shpilrain, Assessing security of some group based cryptosystems, Contemporary Mathematics 360 (2004), 167-177.
  387. V. Shpilrain, Cryptanalysis of Stickel's key exchange scheme, Lecture Notes in Computer Science 5010 (2008), 283-288.
  388. V. Shpilrain, Problems in group theory motivated by cryptography, ArXiv eprint (2018).
  389. V. Shpilrain, A. Ushakov, A new key exchange protocol based on the decomposition problem, Contemporary Mathematics 418 (2006), 161-167.
  390. V. Shpilrain, A. Ushakov, An authentication scheme based on the twisted conjugacy problem, Lecture Notes in Computer Science 5037 (2008), 366-372.
  391. V. Shpilrain, A. Ushakov, The conjugacy search problem in public key cryptography: Unnecessary and insufficient, Applicable Algebra in Engineering Communication and Computing 17 (2006), 285-289.
  392. V. Shpilrain, B. Sosnovski, Compositions of linear functions and applications to hashing, Groups Complexity Cryptology 8 (2016), 155-161.
  393. V. Shpilrain, G. Zapata, Combinatorial group theory and public key cryptography, Applicable Algebra in Engineering Communication and Computing 17 (2006), 291-302.
  394. V. Shpilrain, G. Zapata, Using the subgroup membership search problem in public key cryptography, Contemporary Mathematics 418 (2006), 169-179.
  395. F. Tall, Lindelöf spaces which are Menger, Hurewicz, Alster, productive, or D, Topology and its Applications 158 (2011), 2556-2563.
  396. F. Tall, Productively Lindelof spaces may all be D, Canadian Mathematics Bulletin, to appear.
  397. F. Tall, Set-theoretic problems concerning Lindelöf spaces, Questions and Answers in General Topology, to appear.
  398. F. Tall, S. Todorcevic, S. Tokgöz, The Open Graph Axiom and Menger's Conjecture, ArXiv eprint, 1803.08578.
  399. F. Tall, S. Todorcevic, S. Tokgöz, The Open Graph Axiom and Menger's Conjecture, ArXiv eprint (2018).
  400. F. Tall, S. Tokgöz, On the definability of Menger spaces which are not s-compact, Topology and its Applications 220 (2017), 111-117.
  401. Z. Tang, M. Wang, Linear transformation shift register sequences, Chinese Journal of Network and Information Security 2 (2016), 1-5.
  402. R. Thangadurai, Adams theorem on Bernoulli numbers revisited, Journal of Number Theory 106 (2004), 169-177.
  403. S. Tokgöz, A coanalytic Menger group that is not s-compact, Turkish Journal of Mathematics 42 (2018), 12-20.
  404. S. Tokgöz, The productively Lindelöf property in the remainders of topological spaces, 2018 (to appear),.
  405. T. Tsai, Efficient computation of the iteration of functions, Theoretical Computer Science 410 (2009), 988-993.
  406. S. Tsok, A. Pwasong, N. Jelten, The place of group theory on recent trends in information transmission-encryption and decryption, International Journal of Latest Research in Science and Technology 7 (2018), 18-22.
  407. K. Ueno, Relating L versus P to reversal versus access and their combinatorial structures, IEICE Transactions on Information and Systems E91D (2008), 2776-2783.
  408. H. Ullah, M. Khan, Semi-Hurewicz-Type properties in ditopological texture spaces, Open Mathematics 16 (2018), 1243-1254.
  409. A. Ushakov, Authenticated commutator key agreement protocol, Groups Complexity Cryptology 8 (2016), 127-133.
  410. X. Wang, C. Xu, G. Li, H. Lin, Groups with two generators having unsolvable word problem and presentations of Mihailova subgroups, Communications in Algebra 44 (2016), 3020-3037.
  411. L. Wang, G. Zeng, On the matrix feedback shift register synthesis for matrix sequences, Science China Information Sciences 59 (2016), 1-10.
  412. K. Wang, W. Pei, X. Hong, S. Hong, Z. He, Discrete asymptotic deterministic randomness for the generation of pseudorandom bits, Physics Letters A 373 (2009), 653-660.
  413. T. Weiss, A note on unbounded strongly measure zero subgroups of the Baer-Specker group ZN, Topology and its Applications 156 (2008), 138-141.
  414. T. Weiss, Addendum to "On Meager Additive and Null Additive Sets in the Cantor space 2w and in \mathbbR" (Bull. Polish Acad. Sci. Math. 57 (2009), 91-99), Bulletin of the Polish Academy of Sciences 62 (2014), 1-9.
  415. T. Weiss, More remarks on the intersection ideal MÇN, Commentationes Mathematicae Universitatis Carolinae 59 (2018), 311-316.
  416. T. Weiss, On meager additive and null additive sets in the Cantor space 2w and in R, Bulletin of the Polish Academy of Science - Mathematics 57 (2009), 91-99.
  417. Q. Wen, P. Zhu, Survey of braid-based cryptography, Tongxin Xuebao/Journal on Communication 30 (2009), 105-113.
  418. R. Yin, J. Yuan, Q. Yang, X. Shan, X. Wang, Gemstone: A new stream cipher using coupled map lattice, Lecture Notes in Computer Science 6151 (2010), 198-214.
  419. L. Zdomskyy, o-Boundedness of free objects over a Tychonoff space, Mathematychni Studii 25 (2006), 10-28.
  420. L. Zdomskyy, A characterization of the Menger and Hurewicz properties of subspaces of the real line, Mathematychni Studii 24 (2005), 115-119.
  421. L. Zdomskyy, A semifilter approach to selection principles II: t*-covers, Commentationes Mathematicae Universitatis Carolinae 47 (2006), 539-547.
  422. L. Zdomskyy, A semifilter approach to selection principles, Commentationes Mathematicae Universitatis Carolinae 46 (2005), 525-539.
  423. L. Zdomskyy, Can a Borel group be generated by a Hurewicz subspace?, Mathematychni Studii 25 (2006), 219-224.
  424. H. Zhang, W. Han, X. Lai, D. Lin, J. Ma, J. Li, Survey on cyberspace security, Science China Information Sciences 58 (2015), 1-43.
  425. P. Zhu, Q. Wen, Affine braid groups: a better platform than braid groups for cryptology?, Applicable Algebra in Engineering Communication and Computing 2011 (22), 375-391.
  426. S. Özçag, Bornologies and bitopological function spaces, Filomat 27 (2013), 1345-1349.
  427. S. Özçag, Selective bitopological versions of separability, Topology and its Applications 201 (016), 403-413.
  428. V. Sottová, J. Supina, Principle S1(P, R): ideals and functions, Topology and its Applications (2019),.
  429. J. Supina, Ideal QN-spaces, Journal of Mathematical Analysis and Applications 435 (2016), 477-491.
  430. J. Supina, Notes on modifications of a wQN-space, Tatra Mountains Mathematical Publications 58 (2014), 129-136.
  431. J. Supina, On Ohta-Sakai's properties of a topological space, Topology and its Applications 190 (2015), 119-134.
  432. J. Supina, On sequence selection properties, Filomat 27 (2013), 1523-1544.

Citing preprints

  1. B. Alleche, Extension of continuous functions and weakly developable spaces, preprint.
  2. U. Andrews, I. Goldbring, Hindman's theorem and idempotent types, preprint.
  3. O. Angel, A. Matzavinos, A. Roitershtein, Limit theorem for the Robin Hood game, preprint.
  4. I. Anshel, D. Atkins, D. Goldfeld, P. Gunnells, Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser, preprint.
  5. I. Anshel, D. Atkins, D. Goldfeld, P. Gunnells, Hickory Hash (TM): Implementing an Instance of an Algebraic Eraser (TM) Hash Function on an MSP430 Microcontroller, preprint.
  6. I. Anshel, D. Atkins, D. Goldfeld, P. Gunnells, Ironwood meta key agreement and authentication protocol, preprint.
  7. I. Anshel, D. Atkins, D. Goldfeld, P. Gunnells, Post quantum group theoretic cryptography, preprint.
  8. I. Anshel, D. Atkins, D. Goldfeld, P. Gunnells, WalnutDSA\textTM: A Quantum-Resistant Digital Signature Algorithm, preprint.
  9. L. Aurichi, A. Bella, R. Dias, Selective game versions of countable tightness with bounded finite selections, preprint.
  10. L. Aurichi, L. Zdomskyy, Covering properties of w-mad families, preprint.
  11. L. Aurichi, M. Duzi, Topological games of bounded selections, preprint.
  12. A. Awasthi, R. Sharma, Primitive transformation shift registers of order two over fields of characteristic two, preprint.
  13. A. Awasthi, R. Sharma, Primitive transformation shift registers over finite fields, preprint.
  14. M. Baillif, Notes on linearly H-closed spaces and od-selection principles, preprint.
  15. M. Baillif, Notes on the od-Lindelöf property, preprint.
  16. T. Banakh, Fans and their applications in General Topology, Functional Analysis and Topological Algebra, book preprint.
  17. T. Banakh, Topological spaces with a local ww-base have the strong Pytkeev* property, preprint.
  18. T. Banakh, A. Leiderman, The strong Pytkeev property in topological spaces, preprint.
  19. A. Bella, R. Hernández-Gutiérrez, A non-discrete space X with Cp(X) Menger at infinity, preprint.
  20. A. Bella, S. Tokgöz, L. Zdomskyy, Menger remainders of topological groups, preprint.
  21. S. Bishoi, Implementation and security analysis of construction algorithm for primitive s-LFSR, preprint.
  22. S. Bishoi, H. Haran, S. Hasan, Efficient Multiple-Recursive Matrix Method for Generating Pseudorandom Vectors, preprint.
  23. A. Bolstad, N. Boston, Braid group cryptography untangled, preprint.
  24. K. Bux, D. Sonkin, Some remarks on the braided Thompson group BV, preprint.
  25. M. Chowdhury, Key agreement and authentication schemes using non-commutative semigroups, preprint.
  26. M. Chowdhury, On the AAGL Protocol, preprint.
  27. M. Chowdhury, On the security of the Cha-Ko-Lee-Han-Cheon braid group public key cryptosystem, preprint.
  28. L. Cioffi, J. Katz, J. Liu, E. Soria, Algebraic Eraser: Key Exchange Protocol, Hickory Hash Functions and Attacks, preprint.
  29. M. Craven, D. Robertz, Group Cryptography Using High Performance Computing, preprint.
  30. A. Dorantes-Aldama, D. Shakhmatov, Selective sequential pseudocompactness, preprint.
  31. V. Farmaki, A. Mitropoulos, The l1 dichotomy theorem with respect to a coideal, preprint.
  32. S. Gabriyelyan, A characterization of free locally convex spaces over metrizable spaces which have countable tightness, preprint.
  33. S. Gabriyelyan, J. Kakol, L. Zdomskyy, On topological properties of the weak topology of a Banach space, preprint.
  34. A. Gaeini, M. Ghaffari, Z. Mostaghim, An improved hash function based on the Tillich-Zémor hash function, preprint.
  35. D. Garber, A. Kalka, E. Liberman, M. Teicher, Centralizers of centralizers of parabolic subgroups of braid groups, preprint.
  36. D. Garber, A. Kalka, E. Liberman, M. Teicher, Double centralizers of parabolic subgroups of braid groups, preprint.
  37. M. Goltvanitsa, A construction of skew LRS of maximal period over finite fields based on the defining tuples of factors, preprint.
  38. I. Gotchev, The non-Urysohn number of a topological space, preprint.
  39. J. Gryak, D. Kahrobaei, C. Martinez-Perez, On the Conjugacy Problem in Certain Metabelian Groups, preprint.
  40. X. Guo-Hua, B. Wan-Su, Z. Xing-Kai, W. Yun, A strong blind signature scheme over braid groups, preprint.
  41. X. Guo-Hua, B. Wan-Su, Z. Xing-Kai, W. Yun, Security analysis and design of proxy signature schemes over braid groups, preprint.
  42. W. Han, K. He, G. Zeng, High Efficiency Feedback Shift Register: s-LFSR, preprint.
  43. D. Hart, D. Kim, G. Micheli, G. Pascual-Perez, C. Petit, Y. Quek, A Practical Cryptanalysis of WalnutDSA (TM), preprint.
  44. P. Hecht, A post-quantum set of compact asymmetric protocols using a general linear group, preprint.
  45. P. Hecht, PQC: Triple Decomposition Problem Applied To GL(d, \bbFp) - A Secure Framework For Canonical Non-Commutative Cryptography, preprint.
  46. P. Hecht, Post-Quantum Cryptography: A zero-knowledge authentication protocol, preprint.
  47. M. Helgeson, Security and efficiency of ElGamal's encryption algorithm, preprint.
  48. L. Ho\'la, L. Kocinac, Boundedness properties in function spaces, preprint.
  49. D. Kahrobaei, C. Koupparis, V. Shpilrain, A CCA secure cryptosystem using matrices over group rings, preprint.
  50. D. Kahrobaei, E. Vidaure, Publicly Verifiable Secret Sharing Using Non-Abelian Groups, preprint.
  51. A. Kalka, M. Teicher, Iterated LD-Problem in non-associative key establishment, preprint.
  52. T. Kihara, K. Miyabe, Null-additivity in the theory of algorithmic randomness, preprint.
  53. J. Kim, S. Nepal, N. Li, D. Liu, Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication, preprint.
  54. M. Kotov, A. Menshov, A. Myasnikov, D. Panteleev, A. Ushakov, Conjugacy separation problem in braids: an attack on the original Colored Burau key agreement protocol , preprint.
  55. H. Krawczyk, On extract-then-expand key derivation functions and an HMAC-based KDF, preprint.
  56. S. Krishnaswamy, H. Pillai, On Multisequences and their extensions, preprint.
  57. V. Kumar, K. Ross, A. Singh, Ramsey theory for hypergroups, preprint.
  58. J. Li, L. Wang, Noise-free symmetric fully homomorphic encryption based on noncommutative rings, preprint.
  59. P. Lipparini, Ordinal compactness, preprint.
  60. D. Lyakhovets, A. Osipov, Selection principles and games in bitopological function spaces, preprint.
  61. F. Matucci, Algorithms and classification in groups of piecewise-linear homeomorphisms, preprint.
  62. A. Medini, L. Zdomskyy, Productively Lindelöf spaces of countable tightness, preprint.
  63. A. Menshov, Two general schemes of algebraic cryptography Cryptanalysis of Andrecut's public key cryptosystem, , (preprint).
  64. S. Merz, C. Petit, Factoring products of braids via Garside normal form, preprint.
  65. H. Mildenberger, Finitely many near-coherence classes of ultrafilters, preprint.
  66. D. Neustadter, A reconstruction, assessment, error analysis and simulation of a method for measuring p that could have been used 3000 years ago, preprint.
  67. A. Osipov, A functional characterization of the Hurewicz property, preprint.
  68. A. Osipov, Classification of selectors for sequences of dense sets of Cp (X)-Extension, preprint.
  69. A. Osipov, Classification of selectors for sequences of dense sets of Baire functions, preprint.
  70. A. Osipov, Indestructibly productively Lindelöf and Menger function spaces, preprint.
  71. A. Osipov, On generalization of theorems of Pestriakov, preprint.
  72. A. Osipov, On selective sequentially separability of space of Borel functions, preprint.
  73. A. Osipov, Projective versions of the properties in the Scheepers Diagram-function representation, preprint.
  74. A. Osipov, Selection principles in function spaces with the compact-open topology, preprint.
  75. A. Osipov, Selectors for sequences of subsets of hyperspaces, preprint.
  76. A. Osipov, S. Özçag, A note on the Alster, Menger and D-type properties, preprint.
  77. D. Repovs, L. Zdomskyy, M-separable spaces of functions are productive in the Miller model, preprint.
  78. D. Repovs, L. Zdomskyy, Preservation of g-spaces and covering properties of products, preprint.
  79. F. Russo, Some bounds in probability of commuting n-tuples, preprint.
  80. P. Szewczak, G. Wi\'sniewski, Products of Luzin-type sets with combinatorial properties, preprint.
  81. F. Tall, Definable versions of Menger's conjecture, preprint.
  82. R. Telgarsky, Bibliography of topological games, preprint.
  83. C. Uzcategui-Aylwin, Ideals on countable sets: a survey with questions, preprint.
  84. X. Wang, C. Xu, G. Li, H. Lin, W. Wang, Double shielded public key cryptosystems, preprint.
  85. X. Wang, Y. Chen, H. Lin, Unsolvable generalized word problem in braid subgroups and public key cryptography, preprint.
  86. L. Zdomskyy, Products of Menger spaces in the Miller model, preprint.
  87. O. Zindulka, Meager-additive sets in topological groups, preprint.
  88. O. Zindulka, Small sets of reals through the prism of fractal measures, preprint.
  89. H. Zou, A novel design method of stream ciphers based on table-element permutation, preprint.
  90. S. da-Silva, Hurewicz property and I-bounded families modulo an ideal, preprint.
  91. R. van-Son, Quantifying Shannon's work function for cryptanalytic attacks, preprint.

Number of citing papers per author

32 L. Ko\v{c}inac
27 L. Zdomskyy
19 M. Scheepers
16 T. Banakh, A. Ushakov
15 A. Osipov, V. Shpilrain
14 F. Tall
13 A. Myasnikov
12 D. Repov\v{s}
11 L. Aurichi, M. Sakai
10 S. Gabriyelyan, J. Liu
9 G. Di-Maio, J. Jia, H. Zhang
8 D. Djur\v{c}i\'c, D. Kahrobaei, J. Kakol, S. \"{O}z\c{c}a\u{g}
7 I. Anshel, L. Babinkostova, A. Bella, L. Bukovsk\'y, P. Das, R. Dias, D. Goldfeld, W. Han, A. Kalka, G. Zeng, J. \v{S}upina
6 D. Atkins, D. Chandra, P. Gunnells, P. Hecht, V. Roman'kov, X. Wang
5 S. Hasan, A. Leiderman, H. Mildenberger, D. Panario, B. Pansera, W. Pei, M. Teicher, K. Wang, M. \v{Z}i\v{z}ovic
4 M. Bonanzinga, A. Caserta, M. Chowdhury, D. Garber, R. Gilman, M. Goltvanitsa, Z. He, H. Lin, M. Matveev, A. Miller, C. Petit, S. Shelah, H. Wang, T. Weiss
3 R. AlTawy, V. Anashin, S. Blackburn, M. Boesgaard, M. Craven, V. Farmaki, M. Ghaffari, K. He, M. Hru\v{s}ak, M. Khan, D. Kocev, M. Kotov, G. Li, E. Liberman, X. Liu, S. Mao, A. Menshov, A. Mitropoulos, Z. Mostaghim, R. Pol, S. Ram, K. Ross, U. Samanta, A. Singh, S. Spadaro, R. Steinwandt, P. Szeptycki, S. Tokg\"oz, S. Tokg\"{o}z, W. Wu, Y. Yang
2 S. Alexander, U. Andrews, A. Awasthi, M. Baillif, F. Basile, S. Bishoi, F. Cammaroto, Y. Cheung, J. Christiansen, J. Climent, P. Dehornoy, F. Dellajustina, M. Dewar, I. Dinur, A. Dow, E. El-Mahassni, M. Elkettani, A. Elyahyaoui, A. Eysen, S. Fan, F. Galvin, S. Ghorpade, I. Goldbring, O. Goldreich, S. Goldwasser, D. Gomez, G. Gruenhage, J. Gryak, X. Guo-Hua, G. Han, D. Hart, Y. Hu, S. Iswariya, M. Jeli\'c, D. Karageorgos, D. Kim, C. Koupparis, A. Koutsogiannis, H. Krawczyk, S. Krishnaswamy, V. Kumar, M. L\'opez--Pellicer, H. Lam, J. Li, N. Li, D. Lin, P. Lipparini, D. Liu, C. Ma, L. Martins, F. Matucci, A. Miasnikov, G. Micheli, M. Mr\v{s}evi\'{c}, M. Naor, P. Navarro, S. Nepal, A. Nussboim, D. Panteleev, J. Partala, A. Pavlovi\'c, T. Pedersen, H. Pillai, M. Prasad, Y. Quek, U. Ramos-Garcia, C. Rechberger, O. Reingold, J. Renshaw, V. Rijmen, A. Rishivarman, D. Robertz, O. Scavenius, M. Shah, X. Shan, R. Sharma, T. Tiessen, L. Tortosa, A. Wahab, B. Wan-Su, L. Wang, Q. Wang, Q. Wen, A. Winterhof, Z. Xing-Kai, C. Xu, Q. Yang, R. Yin, A. Youssef, Y. Yu, J. Yuan, W. Yun, G. Zapata, J. Zhou, P. Zhu, O. Zindulka, L. Zou, M. \v{Z}i\v{z}ovi\'c
1 J. Abdullah, H. Aboalsamh, Z. Ahmadian, K. Al-Shehri, O. Alas, M. Albrecht, M. Ali, A. Aljaba, B. Alleche, O. Althobaiti, O. Angel, M. Anshel, F. Araujo, M. Aref, F. Arnault, O. Au, P. Bal, S. Baratella, A. Barenghi, D. Barman, L. Batina, G. Baumslag, G. Beer, E. Begelfor, T. Berger, J. Berggren, D. Bernal--Santos, W. Beullens, S. Bhowmik, B. Bhuyan, B. Biswas, K. Blaney, V. Bogachev, A. Bogdanov, J. Bohli, A. Bolstad, N. Boston, T. Breuckmann, W. Brian, D. Brink, L. Bromberg, P. Burton, K. Bux, J. Camargo, Y. Cao, Z. Cao, N. Carlson, J. Casas-de-la-Rosa, G. Castellan, A. Catalioto, R. Cauty, B. Cavallo, L. Chen, Y. Chen, Q. Cheng, A. Childs, D. Chodounsk\'y, T. Chong, J. Cicho\'n, C. Cid, L. Cioffi, S. Cohen, L. Crone, G. Cui, N. D\'iaz, R. D\'iaz, N. Damljanovi\'{c}, S. Deb, O. Delgado--Mohatar, O. Delgado-Mohatar, P. Derbez, K. Dhafer, B. Dickman, D. Djur\v{c}i\'{c}, C. Dobraunig, A. Dorantes--Aldama, H. Duanmu, M. Duzi, M. Eftekhari, M. Eichlseder, A. El-Atik, M. Elekes, I. Elishakoff, S. Epstein, A. F\'uster-Sabater, A. F\'{u}ster--Sabater, A. Fan, H. Fan, L. Fanucci, N. Fazio, Z. Feng, J. Ferrando, M. Ferrer, R. Filip\'ow, L. Fishman, M. Folkerts, A. Fouque, E. Frenkel, P. Freyre, T. Fun, A. Gaeini, F. Gao, Y. Gao, S. Garcia--Balan, P. Gartside, M. Gary, D. Gauld, V. Gebhardt, B. Glas, G. Gong, M. Gonz\'alez--Vasco, J. Gonzalez-Meneses, I. Gotchev, A. Groch, P. Guillot, C. Guohua, V. Gupta, J. Hale\v{s}, H. Haran, M. He, H. Helfgott, M. Helgeson, T. Helleseth, S. Hern\'andez, R. Hern\'andez--Guti\'errez, R. Hern\'{a}ndez--Guti\'{e}rrez, N. Hiers, L. Ho\'la, D. Hofheinz, F. Hong, S. Hong, X. Hong, P. Hu, Z. Hu, J. Huang, B. Hughes, G. Ivanyos, M. Jaber, A. Jabri, S. Jackson, Y. Javed, N. Jelten, Y. Jian, Y. Jiang, H. Jimbo, F. Jordan, L. Junqueira, H. K\"{u}nzi, M. Kada, M. Kambites, J. Katz, V. Katz, A. Khan, A. Khrennikov, T. Kihara, J. Kim, W. Kim, I. Kizhvatov, K. Ko, O. Kolman, T. Krovetz, A. Kucharski, S. Kudri, G. Kumar, S. Kumar, Y. Kurt, M. Kutylowski, A. Kwela, X. Lai, J. Lano, G. Leander, E. Lee, J. Lee, S. Lemieux, T. Lengyel, L. Lesser, K. Lewi, Z. Li, S. Lin, T. Lin, H. Liu, Y. Liu, X. Liua, R. Lucchetti, Y. Luo, D. Lyakhovets, T. M\'atrai, J. Ma, S. Maffre, N. Mainardi, M. Malliaris, K. Mandal, R. Manoharan, J. Manojlovi\'c, C. Martinez-Perez, A. Matzavinos, N. May, I. Maykov, A. Medini, F. Mendel, N. Mentens, G. Meoni, S. Merz, N. Messina, R. Mezabarba, G. Mill\'{e}rioux, S. Miller, B. Minaud, M. Minier, K. Miyabe, S. Moll, H. Molland, N. Mosina, S. Mostafa, N. Mroszek, C. Mullan, J. Naidu, M. Nasution, D. Neustadter, S. Neves, S. Ng, P. Nickolas, A. Nicolosi, A. Nikolaev, N. Noble, P. Nyikos, Y. Oda, D. Osin, C. P\'erez, K. Pal, G. Paolini, J. Parriaux, G. Pascual--Perez, G. Pelosi, G. Perez, V. Pestov, A. Petojevi\'c, L. Pilato, E. Pines, E. Pol, J. Porter, B. Pousse, B. Preneel, A. Pwasong, A. Qahar, W. Qi, W. Qiang, Y. Qiuhua, J. Quisquater, S. Rasoolzadeh, I. Rec\l{}aw, V. Remeslennikov, E. Reznichenko, M. Robashow, P. Rogaway, R. Rohit, A. Roitershtein, S. Ronjom, Y. Ruming, F. Russo, H. Saad, A. Sabah, A. Sabaha, H. Saini, M. Salmasizadeh, A. Samsudin, M. Sanchis, J. Sanford, T. Schneider, \'{A}. Seress, D. Shakhmatov, H. Sharma, K. Shehri, T. Shi, I. Shparlinski, F. Smentek, H. Soleimany, D. Sonkin, E. Soria, B. Sosnovski, L. Soukup, D. Stavrova, P. Staynova, P. Szewczak, P. Szuca, K. Tamano, T. Tamariz--Mascar\'ua, X. Tang, Z. Tang, R. Telgarsky, R. Thangadurai, T. Thomas, S. Todor\v{c}evi\v{c}, S. Todorcevic, M. Tolba, A. Tomita, T. Tsai, S. Tsok, K. Ueno, H. Ullah, C. Uzc\'ategui, C. Uzcategui--Aylwin, A. Vdovina, R. Venkatesan, I. Verbauwhede, J. Verner, M. Vesterager, E. Vidaure, and W., R. Wagner, B. Wald, B. Wang, F. Wang, M. Wang, S. Wang, W. Wang, S. Weis, G. Wi\'sniewski, Y. Wilamowsky, H. Xia, W. Xiaofei, W. Xiqin, S. Xiuming, T. Xueming, B. Yang, G. Yang, J. Yang, L. Yang, R. Yu, M. Zarichnyi, E. Zenner, M. Zhang, N. Zhang, S. Zhang, M. Zohner, H. Zou, A. Zuk, S. \"Ors, V. \v{S}ottov\'a, M. \v{Z}i\v{z}ovi\'{c}, S. da-Silva, Two general, R. van-Son

Number of citing papers per journal

90 Topology and its Applications.
31 Lecture Notes in Computer Science.
18 Groups Complexity Cryptology.
13 Filomat.
11 Contemporary Mathematics.
8 Applicable Algebra in Engineering Communication and Computing.
7 Fundamenta Mathematicae.
6 Journal of Mathematical Cryptology; Selection Principles and Covering Properties in Topology (L. Ko\v{c}inac, ed.), Quaderni di Matematica.
5 Acta Mathematica Hungarica; ArXiv eprint; Commentationes Mathematicae Universitatis Carolinae.
4 Designs, Codes, and Cryptography; IACR Cryptology eprint; IEEE Transactions on Information Theory; Journal of Mathematical Analysis and Applications; Matematicki Vesnik; Physics Letters A.
3 Journal of Electronics and Information Technology; Journal of Symbolic Logic; Mathematychni Studii; Note di Matematica; Recent Progress in General Topology III; Semigroup Forum; Wuhan University Journal of Natural Sciences.
2 Acta Universitatis Carolinae -- Mathematica et Physica; Archive for Mathematical Logic; China Communications; Communications in Algebra; European Journal of Scientific Research; Houston Journal of Mathematics; ICMSAO; International Journal of Applied Engineering Research; Israel Journal of Mathematics; JP Journal of Algebra, Number Theory and Applications; Journal of Algebra; Journal of Cryptology; Mathematica Bohemica; Monatshefte f\"ur Mathematik; Open Mathematics; Open Problems in Topology II (E. Pearl, ed.); Proceedings of the American Mathematical Society; Science China Information Sciences; Tongxin Xuebao/Journal on Communication; Topology Proceedings; Tsinghua Science and Technology.
1 International Journal of Computer Science and Information Security; Topology and its Applications; 9; ACCN; ACM Transactions on Embedded Computing Systems; Abstarct and Applied Analysis; Acta Mathematica Sinica -- English Series; Advanced Courses in Mathematics CRM Barcelona; Advances in Intelligent Systems and Computing; Advances in Mathematics; American Journal of Business Education; Analysis Mathematica 44; Annales Mathematicae Silesianae; Asiacrypt; B'Or Ha'Torah; Bulletin Belgian Mathematical Society -- Simon Stevin; Bulletin of Symbolic Logic; Bulletin of Symbolic Logic 24; Bulletin of the Malaysian Mathematical Sciences Society; Bulletin of the Polish Academy of Science -- Mathematics; Bulletin of the Polish Academy of Sciences; CRC Press; CSQRWC; Canadian Mathematical Bulletin; Canadian Mathematics Bulletin; Central European Journal of Mathematics; Chaos, Solitons \& Fractals; Chinese Journal of Computers; Chinese Journal of Electronics; Chinese Journal of Network and Information Security; CloudTech; Computational Complexity; Computers and Mathematics with Applications; Cryptography and Communications; Cubo Mathematical Journal; Current Trends in Cryptography; Current Trends in Cryptology (CTCrypt); Czechoslovak Mathematics Journal; ECRYPT Workshop, SASC - The State of the Art of Stream Ciphers; Education Technology and Computer Science; Finite Fields and Their Applications; Fuzzy Sets and Systems; IACR Transactions on Symmetric Cryptology; IAS; ICCCT; ICSTCC; IEEE Transactions on Sustainable Computing; IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; IEICE Transactions on Information and Systems; IET Information Security; Illinois Journal of Mathematics; International Conference on Information Science and Engineering; International Conference on Network Protocols; International Journal Of Science and Technoledge; International Journal of Advanced Engineering Research and Science; International Journal of Algebra and Computation; International Journal of Computer Applications; International Journal of Latest Research in Science and Technology; International Journal of Modern Science and Technology; International Journal of Network Security; International Journal of Network Security; International Journal of Number Theory; International Mathematical Forum; International Symposyum on Information Theory; Journal of College Teaching and Learning; Journal of Function Spaces 2015; Journal of Inequalities in Pure and Applied Mathematics; Journal of Integer Sequences; Journal of Mathematics and Culture; Journal of Nonlinear Science and Applications; Journal of Nonlinear Sciences and Applications; Journal of Number Theory; Journal of Physics Conference Series 1116; Journal of Shanghai Jiaotong University; Journal of Software; Journal of Symbolic Logic Volume; Journal of the American Mathematical Society; Journal of the Australian Mathematical Society; Journal of the Egyptian Mathematical Society; Journal on Communications; Khayyam Journal of Mathematics 1; Lecture Notes Series--Institute for Mathematical Sciences--National University of Singapore; Lecture Notes in Electrical Engineering; Linear Algebra and its Applications; Logic Journal of the IGPL; London Mathematical Society Lecture Note Series; Mathematical Analysis and Applications; Mathematical Aspects of Cryptography; Mathematics and Cryptography (in Russian); Memoirs of the American Mathematical Society; Monografie Matematyczne; NSWCTC; Notices of the American Mathematical Society; Notre Dame Journal of Formal Logic; PKC; Princeton University Press; Proceedings of the 11th Joint International Computer Conference; Proceedings of the 3rd Seminar on Geometry and Topology (Sh. Rezapour, ed.); Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science -- FOCS03; Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms; Proceedings of the First International Conference on Symbolic Computation and Cryptography (J.C. Faug\'ere and D. Wang, eds.); Proceedings of the Steklov Institute of Mathematics; Quaestiones Mathematicae; Quaestiones Mathematicae 41; Questions and Answers in General Topology; Ramanujan Journal; Real Analysis Exchange; Rendiconti del Seminario Matematico di Messina, Serie II; Revista Brasileira de Ensino de F\'{i}sica; Revista Brasileira de Ensino de Fisica; Revista de la Real Academia de Ciencias Exactas, Fisicas y Naturales; SETA; SII Transactions on Internet and Information Systems; SKEW -- Symmetric Key Encryption Workshop; Science China Information Science; Science in China, Series F Information Sciences; Security and Communication Networks; Siam Journal on Computing; Springer Proceedings in Mathematics and Statistics; Studia Scientiarum Mathematicarum Hungarica; Taiwanese Journal of Mathematics; Tatra Mountains Mathematical Publications; The Computer Journal; The ISC International Journal of Information Security; Theoretical Computer Science; Theoretical and Applied Informatics; Topology and its Applications 201; Transactions of the American Mathematical Society; Transactions on Combinatorics; Trends in Mathematics; Turkish Journal of Mathematics; Ukrainian Mathematical Journal; VIII Congreso Iberoamericano de Seguridad Informatica CIBSI'15; WSEAS Transactions on Circuits and Systems; de Gruyter Expositions in Mathematics.