Last update: Wed Sep 26 02:11:46 MDT 2018
@Article{Subramanian:1992:LT,
author = "K. G. Subramanian and R. Siromoney and L. Mathew",
title = "{Lyndon} trees",
journal = j-THEOR-COMP-SCI,
volume = "106",
number = "2",
pages = "373--383",
day = "14",
month = dec,
year = "1992",
CODEN = "TCSCDI",
ISSN = "0304-3975 (print), 1879-2294 (electronic)",
ISSN-L = "0304-3975",
bibdate = "Sat Nov 22 13:15:15 MST 1997",
bibsource = "http://www.math.utah.edu/pub/tex/bib/tcs1990.bib",
acknowledgement = ack-nhfb,
classification = "C1160 (Combinatorial mathematics); C6130S (Data
security)",
corpsource = "Dept. of Math., Madras Christian Coll., India",
fjournal = "Theoretical Computer Science",
journal-URL = "http://www.sciencedirect.com/science/journal/03043975/",
keywords = "cryptanalysis; decryption; encryption; factorization
theorem; Lyndon trees; Lyndon words; public key
cryptography; public key cryptosystem; trees
(mathematics)",
pubcountry = "Netherlands",
treatment = "T Theoretical or Mathematical",
}