A Survey on some Applications of Graph Theory in Cryptography
From MaRDI portal
Publication:5069665
Cites work
- scientific article; zbMATH DE number 5299614 (Why is no real title available?)
- scientific article; zbMATH DE number 1088898 (Why is no real title available?)
- Candidate one-way functions based on expander graphs
- Cryptographic hash functions from expander graphs
- Expander graphs based on GRH with an application to elliptic curve cryptography
- Explicit constructions of extremal graphs and new multivariate cryptosystems
- Graphs with special arcs and cryptography
- How to share a secret
- Sequencings and Directed Graphs with Applications to Cryptography
- Visual Cryptography on Graphs
Cited in
(5)- scientific article; zbMATH DE number 219244 (Why is no real title available?)
- Graph theory and the amateur cryptographer
- scientific article; zbMATH DE number 7589881 (Why is no real title available?)
- Some graph-based encryption schemes
- An encryption algorithm for grey-scale image based on bit-plane decomposition and diffuse representation
This page was built for publication: A Survey on some Applications of Graph Theory in Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5069665)