Attacking a public key cryptosystem based on tree replacement | Publicación