A Survey on some Applications of Graph Theory in Cryptography
From MaRDI portal
Publication:5069665
DOI10.1080/09720529.2013.878819zbMath1495.94067OpenAlexW2480127678MaRDI QIDQ5069665
Publication date: 19 April 2022
Published in: Journal of Discrete Mathematical Sciences and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/09720529.2013.878819
Related Items (3)
An encryption algorithm for grey-scale image based on bit-plane decomposition and diffuse representation ⋮ Unnamed Item ⋮ Some graph-based encryption schemes
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Expander graphs based on GRH with an application to elliptic curve cryptography
- Cryptographic hash functions from expander graphs
- Graphs with special arcs and cryptography
- Explicit constructions of extremal graphs and new multivariate cryptosystems
- How to share a secret
- Candidate One-Way Functions Based on Expander Graphs
- Visual Cryptography on Graphs
- Sequencings and Directed Graphs with Applications to Cryptography
This page was built for publication: A Survey on some Applications of Graph Theory in Cryptography