On some applications of graphs to cryptography and turbocoding
From MaRDI portal
Publication:3621179
zbMATH Open1198.94124MaRDI QIDQ3621179FDOQ3621179
Authors: Tanush Shaska, V. A. Ustimenko
Publication date: 14 April 2009
Full work available at URL: http://x.kerkoje.com/index.php/ajm/article/view/58
Recommendations
- On the extremal regular directed graphs without commutative diagrams and their applications in coding theory and cryptography
- scientific article; zbMATH DE number 5299614
- On the homogeneous algebraic graphs of large girth and their applications
- scientific article; zbMATH DE number 5708055
- On new results on extremal graph theory, theory of algebraic graphs, and their applications
Cited In (18)
- Graph theory and the amateur cryptographer
- On LDPC codes corresponding to affine parts of generalized polygons
- Title not available (Why is that?)
- Graph based cubical multivariate maps and their cryptographical applications.
- Title not available (Why is that?)
- On the homogeneous algebraic graphs of large girth and their applications
- Turán problems for \(k\)-geodetic digraphs
- On the extremal graph theory for directed graphs and its cryptographical applications
- Graphs with special arcs and cryptography
- On new results on extremal graph theory, theory of algebraic graphs, and their applications
- On the extremal regular directed graphs without commutative diagrams and their applications in coding theory and cryptography
- On optimization problems for graphs and security of digital communications
- On extremal graph theory, explicit algebraic constructions of extremal graphs and corresponding Turing encryption machines
- LEXICOGRAPHIC LABELED GRAPHS IN CRYPTOGRAPHY
- On the comparison of cryptographical properties of two different families of graphs with large cycle indicator
- The implementation of cubic public keys based on a new family of algebraic graphs
- On extremal graph theory and symbolic computations
- Title not available (Why is that?)
Uses Software
This page was built for publication: On some applications of graphs to cryptography and turbocoding
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3621179)