scientific article; zbMATH DE number 5299614
zbMATH Open1256.94067MaRDI QIDQ3511532FDOQ3511532
Authors: V. A. Ustimenko
Publication date: 11 July 2008
Full work available at URL: https://eudml.org/doc/11415
Title of this publication is not available (Why is that?)
Recommendations
- scientific article; zbMATH DE number 2081145
- On some applications of graphs to cryptography and turbocoding
- Some graph-based encryption schemes
- LEXICOGRAPHIC LABELED GRAPHS IN CRYPTOGRAPHY
- Cryptanalysis and improvements on some graph-based authentication schemes
- On some properties of graph based public keys
- CERTAIN SPECIFIC GRAPHS IN CRYPTOGRAPHY
- A graph theoretic approach to construct desired cryptographic Boolean functions
- Cryptosystems involving one-factorizations of graphs
- scientific article; zbMATH DE number 5708055
encryptionstream cipherspublic keysmall-world graphsgraph-based algorithmsprivate keygraphs of high girth
Applications of graph theory (05C90) Directed graphs (digraphs), tournaments (05C20) Symbolic computation and algebraic computation (68W30) Cryptography (94A60) Small world graphs, complex networks (graph-theoretic aspects) (05C82) Authentication, digital signatures and secret sharing (94A62)
Cited In (32)
- Graph theory and the amateur cryptographer
- Title not available (Why is that?)
- On some applications of graphs to cryptography and turbocoding
- Dynamical systems as the main instrument for the constructions of new quadratic families and their usage in cryptography
- On the key expansion of \(D(n, K)\)-based cryptographical algorithm
- Title not available (Why is that?)
- Some graph-based encryption schemes
- Graph based cubical multivariate maps and their cryptographical applications.
- On new examples of families of multivariate stable maps and their cryptographical applications
- The cryptography models designed by double odd labelling of trees
- Title not available (Why is that?)
- Title not available (Why is that?)
- Various matching keys for asymmetric topology encryption
- On new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groups
- On the homogeneous algebraic graphs of large girth and their applications
- Graph based private key crypto-system
- On the extremal graph theory for directed graphs and its cryptographical applications
- Title not available (Why is that?)
- Title not available (Why is that?)
- Graphs with special arcs and cryptography
- Function simulation, graph grammars and colourings
- On the key exchange and multivariate encryption with nonlinear polynomial maps of stable degree
- On the \(K\)-theory of graph-based dynamical systems and its application
- On extremal graph theory, explicit algebraic constructions of extremal graphs and corresponding Turing encryption machines
- On the implementation of cubic public keys based on algebraic graphs over the finite commutative rings and their symmetries
- A Survey on some Applications of Graph Theory in Cryptography
- CERTAIN SPECIFIC GRAPHS IN CRYPTOGRAPHY
- LEXICOGRAPHIC LABELED GRAPHS IN CRYPTOGRAPHY
- On the comparison of cryptographical properties of two different families of graphs with large cycle indicator
- On small world semiplanes with generalised Schubert cells
- On extremal graph theory and symbolic computations
- Title not available (Why is that?)
Uses Software
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3511532)