Maximality of affine group, and hidden graph cryptosystems
We describe a new algebraic-combinatorial method of public key encryption with a certain similarity to the well known Imai-Matsumoto. We use the general idea to treat vertices of a linguistic graph (see [21] and further references) as messages and use the iterative process to walk on such graph as e...
Saved in:
| Date: | 2018 |
|---|---|
| Main Author: | Ustimenko, A. A. |
| Format: | Article |
| Language: | English |
| Published: |
Lugansk National Taras Shevchenko University
2018
|
| Subjects: | |
| Online Access: | https://admjournal.luguniv.edu.ua/index.php/adm/article/view/922 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Algebra and Discrete Mathematics |
Institution
Algebra and Discrete MathematicsSimilar Items
A combined data encryption method with identification of their sender
by: Волошко, А. В., et al.
Published: (2021)
by: Волошко, А. В., et al.
Published: (2021)
A method for securely storing a blockchain network account private key
by: Боярінова, Ю. Є., et al.
Published: (2025)
by: Боярінова, Ю. Є., et al.
Published: (2025)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015)
by: Zhuravlev, Dmitry
Published: (2015)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Encoding as a means of protecting information in systems of access control using time-logic functions in the form of polynomials and biometric data of subjects
by: Sachaniuk-Kavets’ka, N. V.
Published: (2018)
by: Sachaniuk-Kavets’ka, N. V.
Published: (2018)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Improvement of role-based access control model in private cloud environments
by: Volynets, O. Yu., et al.
Published: (2019)
by: Volynets, O. Yu., et al.
Published: (2019)
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: Ustimenko, Vasyl
Published: (2015)
by: Ustimenko, Vasyl
Published: (2015)
Some combinatorial characteristics of closure operations
by: Nguyen, Son Hoang, et al.
Published: (2019)
by: Nguyen, Son Hoang, et al.
Published: (2019)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
DEVELOPMENT OF HYDROGEOLOGY IN THE WORLD AND HYDROGEOLOGICAL RESEARCH IN THE INSTITUTE OF GEOLOGICAL SCIENCES OF THE NAS OF UKRAINE
by: Shestopalov, V.M., et al.
Published: (2018)
by: Shestopalov, V.M., et al.
Published: (2018)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014)
by: Iaremchuk, I. E.
Published: (2014)
Seismotectonics of the Koryak Highland — one of active edge of the continent of Eurasia
by: Yarotskyy, G.P., et al.
Published: (2020)
by: Yarotskyy, G.P., et al.
Published: (2020)
On the flag geometry of simple group of Lie type and multivariate cryptography
by: Ustimenko, Vasyl
Published: (2018)
by: Ustimenko, Vasyl
Published: (2018)
On security of GIS systems with N-tier architecture and family of graph based ciphers
by: Ustimenko, Vasyl O., et al.
Published: (2023)
by: Ustimenko, Vasyl O., et al.
Published: (2023)
PREDOMINANT TRAVELING IONOSPHERIC DISTURBANCES OVER EASTERN EUROPE DURING LOW LEVELS OF SOLAR AND GEOMAGNETIC ACTIVITIES USING INCOHERENT SCATTER RADAR DATA
by: Aksonova, K. D., et al.
Published: (2020)
by: Aksonova, K. D., et al.
Published: (2020)
An approach to evaluation of survivability of scientific publications in the long-term storage in the Internet environment
by: Lande, D. V., et al.
Published: (2013)
by: Lande, D. V., et al.
Published: (2013)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Synergy of quantum computing and federated learning in information technology detection of hidden target groups
by: Fadeichev, Serhii, et al.
Published: (2025)
by: Fadeichev, Serhii, et al.
Published: (2025)
Maximal subgroup growth of a few polycyclic groups
by: Kelley, A., et al.
Published: (2022)
by: Kelley, A., et al.
Published: (2022)
Modeling the Consolidated Information Resource for Communicative Interaction with Users of University Department Web Page
by: Kotylo, O. M., et al.
Published: (2013)
by: Kotylo, O. M., et al.
Published: (2013)
Estimation and forecast of changes in the hydrochemical status of the Tisza river
by: Vasilenko, L.O., et al.
Published: (2018)
by: Vasilenko, L.O., et al.
Published: (2018)
Problems of centralized financial systems and their solution with the help of Blockchain technology
by: Охріменко, Т. О., et al.
Published: (2022)
by: Охріменко, Т. О., et al.
Published: (2022)
System of automated software control of the antenna system of the satellite
by: Yehorov, Volodymyr O.
Published: (2024)
by: Yehorov, Volodymyr O.
Published: (2024)
Prospects of designing small architectural forms using alternative energy sources
by: Tkachenko, Тetiana, et al.
Published: (2021)
by: Tkachenko, Тetiana, et al.
Published: (2021)
Research of dynamics of publications on informatics in abstract database «Ukrainika naukova»
by: Kryuchyn, A. A., et al.
Published: (2014)
by: Kryuchyn, A. A., et al.
Published: (2014)
ЯКІСНИЙ АНАЛІЗМАТЕМАТИЧНИХ МОДЕЛЕЙ ПРОЦЕСІВ І ПРИСТРОЇВ ПЕРВИННОЇ ОБРОБКИ ВУГЛЕВОДНЕВОЇ СИРОВИНИ НА ОСНОВІ УЗАГАЛЬНЕНИХ МОДЕЛЕЙ
by: Polozhaenko, Sergey Anatolievich
Published: (2013)
by: Polozhaenko, Sergey Anatolievich
Published: (2013)
AN INTERFERENCE-IMMUNE COMMUNICATION SYSTEM FOR DIGITAL DATA TRANSMISSION BASED ON A MULTI-CHANNEL CORRELATOR Part 1. DEVELOPMENT OF A SIGNAL FORMATION AND DECODING ALGORITHM FOR THE SUB-NOISE COMMUNICATION SYSTEM
by: Varavin, A. V., et al.
Published: (2025)
by: Varavin, A. V., et al.
Published: (2025)
AN INTERFERENCE-IMMUNE COMMUNICATION SYSTEM FOR DIGITAL DATA TRANSMISSION BASED ON A MULTI-CHANNEL CORRELATOR Part 2. DEVELOPMENT OF A CORRELATION-TYPE TRANSCEIVER BASED ON A MULTI-CHANNEL CORRELATOR
by: Varavin, A. V., et al.
Published: (2025)
by: Varavin, A. V., et al.
Published: (2025)
On Markov graphs
by: Kozerenko, Sergiy
Published: (2018)
by: Kozerenko, Sergiy
Published: (2018)
Security of decision support systems based on decentralized data platforms
by: Савченко, М. М.
Published: (2023)
by: Савченко, М. М.
Published: (2023)
Publication activity, a role and contribution of V.I. Starostenko to the scientific result
by: Yakimchik, A.I.
Published: (2020)
by: Yakimchik, A.I.
Published: (2020)
Features of decision support in government situational centers to protect critical infrastructure
by: Гречанінов , В. Ф.
Published: (2021)
by: Гречанінов , В. Ф.
Published: (2021)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Information and mathematical model of quantum communication channel state control processes
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
Comparative Approach and Risk Factors in Business Valuation of Shares in Non-Public Companies
by: Iliychovski, Svetoslav, et al.
Published: (2025)
by: Iliychovski, Svetoslav, et al.
Published: (2025)
Realizations of affine Lie algebras
by: Futorny, Vyacheslav
Published: (2018)
by: Futorny, Vyacheslav
Published: (2018)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Similar Items
-
A combined data encryption method with identification of their sender
by: Волошко, А. В., et al.
Published: (2021) -
A method for securely storing a blockchain network account private key
by: Боярінова, Ю. Є., et al.
Published: (2025) -
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015) -
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018) -
Encoding as a means of protecting information in systems of access control using time-logic functions in the form of polynomials and biometric data of subjects
by: Sachaniuk-Kavets’ka, N. V.
Published: (2018)