A Survey on some Applications of Graph Theory in Cryptography
From MaRDI portal
Publication:5069665
DOI10.1080/09720529.2013.878819zbMATH Open1495.94067OpenAlexW2480127678MaRDI QIDQ5069665FDOQ5069665
Authors: P. L. K. Priyadarsini
Publication date: 19 April 2022
Published in: Journal of Discrete Mathematical Sciences and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/09720529.2013.878819
Cites Work
- How to share a secret
- Title not available (Why is that?)
- Cryptographic hash functions from expander graphs
- Candidate one-way functions based on expander graphs
- Expander graphs based on GRH with an application to elliptic curve cryptography
- Graphs with special arcs and cryptography
- Title not available (Why is that?)
- Explicit constructions of extremal graphs and new multivariate cryptosystems
- Sequencings and Directed Graphs with Applications to Cryptography
- Visual Cryptography on Graphs
Cited In (5)
Uses Software
This page was built for publication: A Survey on some Applications of Graph Theory in Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5069665)