Fundamental circuits and cut-sets used in cryptography
From MaRDI portal
Publication:2833283
Recommendations
Cites work
Cited in
(6)- Some graph-based encryption schemes
- The elliptic scalar multiplication graph and its application in elliptic curve cryptography
- On local super antimagic total face coloring and the application in developing a cipher block chaining key
- Application of cryptography in data privacy using fuzzy graph theory
- Inner magic and inner antimagic graphs in cryptography
- Algorithm of multidimensional data transmission using extremal uniform hypergraphs
This page was built for publication: Fundamental circuits and cut-sets used in cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2833283)