Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Export
Sort by: Relevance
  • Open Access Icon
  • Research Article
  • Cite Count Icon 12
  • 10.1515/gcc.2010.014
Some geodesic problems in groups
  • Jan 1, 2010
  • Groups – Complexity – Cryptology
  • Murray Elder + 1 more

We consider several algorithmic problems concerning geodesics in finitely generated groups. We show that the three geodesic problems considered by Miasnikov et al [arXiv:0807.1032] are polynomial-time reducible to each other. We study two new geodesic problems which arise in a previous paper of the authors and Fusy [arXiv:0902.0202] .

  • Open Access Icon
  • Research Article
  • Cite Count Icon 1
  • 10.1515/gcc.2010.003
Presentations of matrix rings
  • Jan 1, 2010
  • Groups – Complexity – Cryptology
  • Martin Kassabov

We construct a short presentation of the ring of n × n matrices over Z with only 2 generators and 3 relations.

  • Research Article
  • Cite Count Icon 6
  • 10.1515/gcc.2010.011
The Latin squares and the secret sharing schemes
  • Jan 1, 2010
  • Groups – Complexity – Cryptology
  • Chi Sing Chum + 1 more

  • Research Article
  • Cite Count Icon 22
  • 10.1515/gcc.2010.016
Algebraic attacks using SAT-solvers
  • Jan 1, 2010
  • Groups – Complexity – Cryptology
  • Philipp Jovanovic + 1 more

Algebraic attacks lead to the task of solving polynomial systems over F2. We study recent suggestions of using SAT-solvers for this task. In particular, we develop several strategies for converting the polynomial system to a set of CNF clauses. This generalizes the approach in [4]. Moreover, we provide a novel way of transforming a system over F2e to a (larger) system over F2. Finally, the efficiency of these methods is examined using standard examples such as CTC, DES, and Small Scale AES.

  • Open Access Icon
  • Research Article
  • Cite Count Icon 11
  • 10.1515/gcc.2010.013
Cutting up graphs revisited – a short proof of Stallings' structure theorem
  • Jan 1, 2010
  • Groups – Complexity – Cryptology
  • Bernhard Krön

This is a short proof of the existence of finite sets of edges in graphs with more than one end, such that after removing them we obtain two components which are nested with all their isomorphic images. This was first done in “Cutting up graphs” [Dunwoody, Combinatorica 2: 15–23, 1982]. Together with a certain tree construction and some elementary Bass–Serre theory this yields a combinatorial proof of Stallings' theorem on the structure of finitely generated groups with more than one end.

  • Open Access Icon
  • Research Article
  • Cite Count Icon 3
  • 10.1515/gcc.2010.009
On finite Thurston-type orderings of braid groups
  • Jan 1, 2010
  • Groups – Complexity – Cryptology
  • Tetsuya Ito

We prove that for any finite Thurston-type ordering $<_{T}$ on the braid group\ $B_{n}$, the restriction to the positive braid monoid $(B_{n}^{+},<_{T})$ is a\ well-ordered set of order type $\omega^{\omega^{n-2}}$. The proof uses a combi\ natorial description of the ordering $<_{T}$. Our combinatorial description is \ based on a new normal form for positive braids which we call the $\C$-normal fo\ rm. It can be seen as a generalization of Burckel's normal form and Dehornoy's \ $\Phi$-normal form (alternating normal form).

  • Research Article
  • Cite Count Icon 13
  • 10.1515/gcc.2010.004
The diameter of a random Cayley graph of ℤ q
  • Jan 1, 2010
  • Groups – Complexity – Cryptology
  • Gideon Amir + 1 more

Consider the Cayley graph of the cyclic group of prime order q with k uniformly chosen generators. For fixed k, we prove that the diameter of said graph is asymptotically (in q) of order k √ q. The same also holds when the generating set is taken to be a symmetric set of size 2k.

  • Research Article
  • Cite Count Icon 42
  • 10.1515/gcc.2010.002
An update on Hurwitz groups
  • Jan 1, 2010
  • Groups – Complexity – Cryptology
  • Marston Conder

A Hurwitz group is any non-trivial finite quotient of the (2, 3, 7) triangle group, that is, any non-trivial finite group generated by elements x and y satisfying x2 = y3 = (xy)7 = 1. Every such group G is the conformal automorphism group of some compact Riemann surface of genus g > 1, with the property that |G| = 84(g – 1), which is the maximum possible order for given genus g. This paper provides an update on what is known about Hurwitz groups and related matters, following up the author's brief survey in Bull. Amer. Math. Soc.23 (1990).

  • Research Article
  • Cite Count Icon 8
  • 10.1515/gcc.2010.007
Algebraic geometry over natural numbers. The classification of coordinate monoids
  • Jan 1, 2010
  • Groups – Complexity – Cryptology
  • A Shevlyakov

In this paper we classify the coordinate ℕ-monoids of algebraic sets over the additive monoid of natural numbers.

  • Research Article
  • Cite Count Icon 3
  • 10.1515/gcc.2010.005
Challenge response password security using combinatorial group theory
  • Jan 1, 2010
  • Groups – Complexity – Cryptology
  • Gilbert Baumslag + 3 more

Challenge response methods are increasingly used to enhance password security. In this paper we present a very secure method for challenge response password verification using combinatorial group theory. This method, which relies on the group randomizer system, a subset of the MAGNUS computer algebra system, handles most of the present problems with challenge response systems. Theoretical security is based on several results in asymptotic group theory.