000 05498cam a2200481 i 4500
001 17414587
003 RPAM
005 20200421115712.0
006 aa b 100 0
007 cr/|||||||||||
008 140929s2012 riua ob 100 0 eng
020 _a9780821894040 (online)
040 _aDLC
_beng
_cDLC
_erda
_dDLC
_dRPAM
050 0 0 _aQA174
_b.C645 2012
082 0 0 _a512/.2
_223
084 _a20-XX
_a68-XX
_2msc
245 0 0 _aComputational and combinatorial group theory and cryptography :
_h[electronic resource]
_bAMS Special Sessions: Computational Algebra, Groups, and Applications, April 30-May 1, 2011, University of Nevada, Las Vegas, NV, Mathematical Aspects of Cryptography and Cyber Security, September 10-11, 2011, Cornell University, Ithaca, NY /
_cBenjamin Fine, Delaram Kahrobaei, Gerhard Rosenberger, editors.
264 1 _aProvidence, Rhode Island :
_bAmerican Mathematical Society,
_c[2012]
300 _a1 online resource (vii, 199 pages : illustrations)
336 _atext
_2rdacontent
337 _aunmediated
_2rdamedia
338 _avolume
_2rdacarrier
490 0 _aContemporary mathematics,
_x0271-4132 (print);
_x1098-3627 (online);
_vv. 582
504 _aIncludes bibliographical references.
505 0 0 _tWeyl Gr�obner Basis Cryptosystems /
_rRashid Ali and Martin Kreuzer --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11554
_tA New Look at Finitely Generated Metabelian Groups /
_rGilbert Baumslag, Roman Mikhailov and Kent E. Orr --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11551
_t$IA$-Automorphisms of Groups with Almost Constant Upper Central Series /
_rMarianna Bonanome, Margaret H. Dean and Marcos Zyman --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11564
_tA Proposed Alternative to the Shamir Secret Sharing Scheme /
_rChi Sing Chum, Benjamin Fine, Gerhard Rosenberger and Xiaowen Zhang --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11559
_tImproving Latin Square Based Secret Sharing Schemes /
_rChi Sing Chum and Xiaowen Zhang --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11562
_tA Hand-Computation Involving Surface Groups, the Reidemeister-Schreier Rewriting Process and Kurosh Subgroup Theorem /
_rAnthony E. Clement --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11565
_tAdjunction of Roots in Exponential A-Groups /
_rMargaret H. Dean, Stephen Majewicz and Marcos Zyman --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11563
_tLogspace Computations in Coxeter Groups and Graph Groups /
_rVolker Diekert, Jonathan Kausch and Markus Lohrey --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11553
_tCollection by Polynomials in Finite $p$-groups /
_rBettina Eick --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11552
_tAll Finite Generalized Tetrahedon Groups II /
_rBenjamin Fine, Alexander Hulpke and Gerhard Rosenberger --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11560
_tThe Classification of One Relator Limit Groups and the Surface Group Conjecture /
_rBenjamin Fine and Gerhard Rosenberger --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11558
_tDiscrimination and Separation in the Metabelian Variety /
_rAnthony M. Gaglione, Seymour Lipschutz and Dennis Spellman --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11555
_tA Secret Sharing Scheme Based on Group Presentations and the Word Problem /
_rMaggie Habeeb, Delaram Kahrobaei and Vladimir Shpilrain --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11557
_tAuthenticated Key Agreement with Key Re-Use in the Short Authenticated Strings Model /
_rStanislaw Jarecki and Nitesh Saxena --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11556
_tPublicly Verifiable Secret Sharing Using Non-Abelian Groups /
_rDelaram Kahrobaei and Elizabeth Vidaurre --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11561
_tA Note on the Hyperbolicity of Strict Pride Groups /
_rMatthias Neumann-Brosig --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11566
_tAn Algorithm to Express Words as a Product of Conjugates of Relators /
_rEllen Ziliak --
_uhttp://www.ams.org/conm/582/
_uhttp://dx.doi.org/10.1090/conm/582/11567
506 1 _aAccess is restricted to licensed institutions
533 _aElectronic reproduction.
_bProvidence, Rhode Island :
_cAmerican Mathematical Society.
_d2012
538 _aMode of access : World Wide Web
588 _aDescription based on print version record.
650 0 _aGroup theory
_vCongresses.
650 0 _aCryptography
_vCongresses.
650 7 _aGroup theory and generalizations.
_2msc
650 7 _aComputer science.
_2msc
700 1 _aFine, Benjamin,
_d1948-
_eeditor of compilation.
700 1 _aKahrobaei, Delaram,
_d1975-
_eeditor of compilation.
700 1 _aRosenberger, Gerhard,
_eeditor of compilation.
711 2 _aAMS Special Session on Computational Algebra, Groups, and Applications
_d(2011 :
_cUniversity of Nevada)
711 2 _aAMS Special Session on Mathematical Aspects of Cryptography and Cyber Security
_d(2011 :
_cCornell University)
776 0 _iPrint version:
_tComputational and combinatorial group theory and cryptography :
_w(DLC) 2012023441
_x0271-4132
_z9780821875636
856 4 _3Contents
_uhttp://www.ams.org/conm/582/
856 4 _3Contents
_uhttp://dx.doi.org/10.1090/conm/582
942 _cEBK
999 _c59989
_d59989