Computation and automata
Cryptology: language-theoretic aspects
Handbook of formal languages, vol. 2
Tree-Manipulating Systems and Church-Rosser Theorems
Journal of the ACM (JACM)
On Public-Key Cryptosystem Based on Church-Rosser String-Rewriting Systems (Extended Abstract)
COCOON '95 Proceedings of the First Annual International Conference on Computing and Combinatorics
Attacking a public key cryptosystem based on tree replacement
Discrete Applied Mathematics
Completion attacks and weak keys of oleshchuk’s public key cryptosystem
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Hi-index | 0.00 |
In this paper, a public key cryptosystem based on tree replacement system is proposed.