On new symbolic key exchange protocols and cryptosystems based on a hidden tame homomorphism
Multivariate cryptosystems are divided into public rules, for which tools of encryption are open for users and systems
 of the El Gamal type, for which the encryption function is not given in public, and, for its generation, the opponent
 has to solve a discrete logarithm problem in...
Saved in:
| Published in: | Доповіді НАН України |
|---|---|
| Date: | 2018 |
| Main Author: | Ustimenko, V.A. |
| Format: | Article |
| Language: | English |
| Published: |
Видавничий дім "Академперіодика" НАН України
2018
|
| Subjects: | |
| Online Access: | https://nasplib.isofts.kiev.ua/handle/123456789/144520 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Digital Library of Periodicals of National Academy of Sciences of Ukraine |
| Cite this: | On new symbolic key exchange protocols and cryptosystems based on a hidden tame homomorphism / V.A. Ustimenko // Доповіді Національної академії наук України. — 2018. — № 10. — С. 26-36. — Бібліогр.: 15 назв. — англ. |
Institution
Digital Library of Periodicals of National Academy of Sciences of UkraineSimilar Items
On new symbolic key exchange protocols and cryptosystems based on a hidden tame homomorphism
by: V. A. Ustimenko
Published: (2018)
by: V. A. Ustimenko
Published: (2018)
On new multivariate cryptosystems based on hidden Eulerian equations
by: Ustimenko, V.A.
Published: (2017)
by: Ustimenko, V.A.
Published: (2017)
On new key exchange multivariate protocols based on pseudorandom walks on incidence structures
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
On new multivariate cryptosystems based on hidden Eulerian equations
by: V. A. Ustimenko
Published: (2017)
by: V. A. Ustimenko
Published: (2017)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A.A.
Published: (2005)
by: Ustimenko, A.A.
Published: (2005)
On new key exchange multivariate protocols based on pseudorandom walks on incidence structures
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
On multivariate public key based on a pair of transformation with density gap
by: Ustimenko, V.A.
Published: (2018)
by: Ustimenko, V.A.
Published: (2018)
On new multivariate cryptosystems with nonlinearity gap
by: V. Ustimenko
Published: (2017)
by: V. Ustimenko
Published: (2017)
On new multivariate cryptosystems with nonlinearity gap
by: Ustimenko, V.
Published: (2017)
by: Ustimenko, V.
Published: (2017)
A Protocol for Exchange Information on the Base of Linear Functions and Operators
by: S. P. Kryvyi, et al.
Published: (2022)
by: S. P. Kryvyi, et al.
Published: (2022)
On new results on extremal graph theory, theory of algebraic graphs, and their applications
by: Ustimenko, V.O.
Published: (2022)
by: Ustimenko, V.O.
Published: (2022)
On two windows multivariate cryptosystem depending on random parameters
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
by: Romańczuk-Polubiec, U., et al.
Published: (2015)
On two windows multivariate cryptosystem depending on random parameters
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
by: U. Romańczuk-Polubiec, et al.
Published: (2015)
On walks of variable length in the Schubert incidence systems and multivariate flow ciphers
by: Ustimenko, V.A.
Published: (2014)
by: Ustimenko, V.A.
Published: (2014)
Symbolic modeling of basic protocols systems with arbitrary number of agents
by: Potiyenko, S.V.
Published: (2013)
by: Potiyenko, S.V.
Published: (2013)
Symbolic Modeling of Basic Protocols Systems with Arbitrary Number of Agents
by: S. V. Potiyenko
Published: (2013)
by: S. V. Potiyenko
Published: (2013)
Code-based Cryptosystem for Post-quantum Application
by: O. O. Kuznetsov, et al.
Published: (2017)
by: O. O. Kuznetsov, et al.
Published: (2017)
Amount of key information contained in open and encrypted text sets of the symmetric randomized mceliece cryptosystem
by: S. V. Mitin
Published: (2020)
by: S. V. Mitin
Published: (2020)
Tame and wild subspace problems
by: Gabriel, P., et al.
Published: (1993)
by: Gabriel, P., et al.
Published: (1993)
Tame and wild subspace problems
by: Gabriel, Р., et al.
Published: (1993)
by: Gabriel, Р., et al.
Published: (1993)
Secure Data Exchange Protocol Development for Special Networks
by: M. I. Ohurtsov
Published: (2019)
by: M. I. Ohurtsov
Published: (2019)
Derived tame and derived wild algebras
by: Drozd, Yuriy A.
Published: (2018)
by: Drozd, Yuriy A.
Published: (2018)
Derived tame and derived wild algebras
by: Drozd, Y.A.
Published: (2004)
by: Drozd, Y.A.
Published: (2004)
On multivariate public key based on a pair of transformation with density gap
by: V. A. Ustimenko
Published: (2018)
by: V. A. Ustimenko
Published: (2018)
The Analysis of Difficulty of Realizations of Cryptosystems on Groups
by: H. Z. Khalimov
Published: (2017)
by: H. Z. Khalimov
Published: (2017)
Influence of the experimental parameters of the optical fiber in the Quantum Key Distribution, the BB84 protocol
by: L. Bouchoucha, et al.
Published: (2018)
by: L. Bouchoucha, et al.
Published: (2018)
Influence of the experimental parameters of the optical fiber in the Quantum Key Distribution, the protocol BB84
by: Bouchoucha, L., et al.
Published: (2018)
by: Bouchoucha, L., et al.
Published: (2018)
Modeling of scenarios for the underground construction planning based on the foresight and cognitive modeling methodologies
by: Pankratova, N.D., et al.
Published: (2021)
by: Pankratova, N.D., et al.
Published: (2021)
On tame semigroups generated by idempotents with partial null multiplication
by: Bondarenko, Vitaliy M., et al.
Published: (2018)
by: Bondarenko, Vitaliy M., et al.
Published: (2018)
\(p\)-Conjecture for tame automorphisms of \(\mathbb{C}^3\)
by: Holik, Daria, et al.
Published: (2025)
by: Holik, Daria, et al.
Published: (2025)
On tame semigroups generated by idempotents with partial null multiplication
by: Bondarenko, V.M., et al.
Published: (2008)
by: Bondarenko, V.M., et al.
Published: (2008)
Taming the foreignness - experience of the world in recent Polish prose
by: A. Bajda
Published: (2015)
by: A. Bajda
Published: (2015)
A new hybrid method for solving variational inequalities
by: Malitsky, Yu.V., et al.
Published: (2014)
by: Malitsky, Yu.V., et al.
Published: (2014)
Endomorphisms of Clifford semigroups with injective structure homomorphisms
by: Worawiset, S., et al.
Published: (2021)
by: Worawiset, S., et al.
Published: (2021)
Endomorphisms of Clifford semigroups with injective structure homomorphisms
by: Worawiset, S., et al.
Published: (2020)
by: Worawiset, S., et al.
Published: (2020)
On Homomorphisms of Algebras Generated by Projectors and Coxeter Functors
by: Popovich, S. V., et al.
Published: (2003)
by: Popovich, S. V., et al.
Published: (2003)
A new projective exact penalty function for a general constrained optimization
by: Norkin, V.I.
Published: (2022)
by: Norkin, V.I.
Published: (2022)
Tame comodule type, roiter bocses, and a geometry context for coalgebras
by: Simson, D., et al.
Published: (2009)
by: Simson, D., et al.
Published: (2009)
Generalized derivations acting on multilinear polynomials as a Jordan homomorphisms
by: S. K. Tiwari, et al.
Published: (2022)
by: S. K. Tiwari, et al.
Published: (2022)
Similar Items
-
On new symbolic key exchange protocols and cryptosystems based on a hidden tame homomorphism
by: V. A. Ustimenko
Published: (2018) -
On new multivariate cryptosystems based on hidden Eulerian equations
by: Ustimenko, V.A.
Published: (2017) -
On new key exchange multivariate protocols based on pseudorandom walks on incidence structures
by: Romańczuk-Polubiec, U., et al.
Published: (2015) -
On new multivariate cryptosystems based on hidden Eulerian equations
by: V. A. Ustimenko
Published: (2017) -
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)