Some new directions in infinite-combinatorial topology B Tsaban Set Theory, 225-255, 2006 | 112 | 2006 |
Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography B Tsaban Journal of Cryptology 28, 601-622, 2015 | 103 | 2015 |
The combinatorics of Borel covers M Scheepers, B Tsaban Topology and its Applications 121 (3), 357-382, 2002 | 89 | 2002 |
Length-based conjugacy search in the Braid group D Garber, S Kaplan, M Teicher, B Tsaban, U Vishne Contemporary Mathematics 418, 75-87, 2006 | 82* | 2006 |
Efficient linear feedback shift registers with maximal period B Tsaban, U Vishne Finite Fields and their Applications 8, 256-267, 2002 | 80 | 2002 |
Scales, fields, and a problem of Hurewicz B Tsaban, L Zdomsky Journal of the European Mathematical Society 10, 837-866, 2008 | 77* | 2008 |
Probabilistic solutions of equations in the braid group D Garber, S Kaplan, M Teicher, B Tsaban, U Vishne Advances in Applied Mathematics 35 (3), 323-334, 2005 | 75 | 2005 |
Hereditary topological diagonalizations and the Menger-Hurewicz Conjectures T Bartoszyński, B Tsaban Proceedings of the American Mathematical Society 134 (2), 605-615, 2006 | 66 | 2006 |
Menger’s and Hurewicz’s Problems: Solutions from “The Book” and refinements B Tsaban Contemporary Mathematics 533, 211-226, 2011 | 64 | 2011 |
Cryptanalysis via algebraic spans A Ben-Zvi, A Kalka, B Tsaban Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 60 | 2018 |
Cryptanalysis of SP networks with partial non-linear layers A Bar-On, I Dinur, O Dunkelman, V Lallemand, N Keller, B Tsaban Annual International Conference on the Theory and Applications of …, 2015 | 51* | 2015 |
Hereditarily Hurewicz spaces and Arhangel'skii sheaf amalgamations B Tsaban, L Zdomskyy Journal of the European Mathematical Society 12, 353-372, 2012 | 47 | 2012 |
Selection principles and the minimal tower problem B Tsaban Note di Matematica 22, 53-81, 2003 | 42* | 2003 |
Linear 𝜎-additivity and some applications T Orenshtein, B Tsaban Transactions of the American Mathematical Society 363 (7), 3621-3637, 2011 | 40 | 2011 |
Guaranteeing the diversity of number generators A Shamir, B Tsaban Information and Computation 171 (2), 350-363, 2001 | 38 | 2001 |
Length-based cryptanalysis: the case of Thompson's group D Ruinskiy, A Shamir, B Tsaban Journal of Mathematical Cryptology 1 (4), 359-372, 2007 | 36 | 2007 |
Selection principles in mathematics: A milestone of open problems B Tsaban arXiv preprint math/0312182, 2003 | 35 | 2003 |
Short expressions of permutations as products and cryptanalysis of the Algebraic Eraser A Kalka, M Teicher, B Tsaban Advances in Applied Mathematics 49 (1), 57-76, 2012 | 34* | 2012 |
Selection principles and special sets of reals B Tsaban Open problems in topology II, 91-108, 2007 | 31 | 2007 |
Cryptanalysis of group-based key agreement protocols using subgroup distance functions D Ruinskiy, A Shamir, B Tsaban Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007 | 31 | 2007 |