Book:
Smart Innovation, Systems and Technologies
(Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics)
Volume 44
(2016),
p. 337
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem