Eun-Jun Yoon, Kee-Young Yoo
Conference:
(2011),
p. 547
New Results on Algebraic Constructions of Extremal Graph Theory and Implementations of New Algorithms of Postquantum Cryptography
Vasyl Ustimenko, Tymoteusz Chojecki
Book:
Lecture Notes in Networks and Systems
(Intelligent Computing)
Volume 739
(2023),
p. 1409
On Multivariate Algorithms of Digital Signatures on Secure El Gamal‐Type Mode
A Secured Digital Signature Using Conjugacy and DLP on Non-commutative Group over Finite Field
L. Narendra Mohan, G.S.G.N. Anjaneyulu
Book:
Advances in Intelligent Systems and Computing
(Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications)
Volume 516
(2017),
p. 457
Method of Information Security Risk Analysis for Virtualized System
Post-quantum Cryptoschemes: New Finite Non-commutative Algebras for Defining Hidden Logarithm Problem
Hieu Minh Nguyen, Nikolay Andreevich Moldovyan, Alexandr Andreevich Moldovyan, Nam Hai Nguyen, Cong Manh Tran, Ngoc Han Phieu
Book:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
(Context-Aware Systems and Applications, and Nature of Computation and Communication)
Volume 266
(2019),
p. 183
On Non-commutative Cryptography with Cubical Multivariate Maps of Predictable Density
V. Ustimenko, M. Klisowski
Book:
Advances in Intelligent Systems and Computing
(Intelligent Computing)
Volume 998
(2019),
p. 654
2013 International Conference on IT Convergence and Security (ICITCS)
Hongxin Ma, Yingjue Fang, Xiaofeng Wang
Post-quantum Digital-Signature Algorithms on Finite 6-Dimensional Non-commutative Algebras
Nikolay A. Moldovyan, Dmitriy N. Moldovyan, Alexander A. Moldovyan, Hieu Minh Nguyen, Le Hoang Tuan Trinh
Book:
Lecture Notes in Computer Science
(Future Data and Security Engineering)
Volume 12466
(2020),
p. 325
On the Restoration of Historical Matsumoto-Imai Cryptosystem and Other Schemes in Terms of Noncommutative Cryptography
Book:
Lecture Notes in Networks and Systems
(Proceedings of the Future Technologies Conference (FTC) 2024, Volume 2)
Volume 1155
(2024),
p. 99
A New Key Exchange Protocol Based on Infinite Non-Abelian Groups
Jing Zhang, Ya-Juan Yang, Yi-Peng Li, Xingsi Xue
Journal:
Security and Communication Networks
Volume 2022
(2022),
p. 1
A novel version of the hidden logarithm problem for post-quantum signature algorithms
Minh Hieu Nguyen, Canh Ngoc Hoang, A.A. Moldovyan, N.A. Moldovyan, Huy Quang Vu, Danh Kim Le Tran
Journal:
Theoretical Computer Science
Volume 921
(2022),
p. 36
Asymmetric Secret Key Transfer Scheme over an Open Channel in K-Deterministic Groups with the Conditions C (3) –T (6)
N. V. Bezverkhniy, M. V. Nikitina
Journal:
Mathematics and Mathematical Modeling
Issue 6
(2019),
p. 88
Authenticated commutator key agreement protocol
Journal:
Groups Complexity Cryptology
Volume 8,
Issue 2
(2016)
Enhanced Matrix Power Function for Cryptographic Primitive Construction
Journal:
Symmetry
Volume 10,
Issue 2
(2018),
p. 43
Finite Non-Commutative Associative Algebras as Carriers of Hidden Discrete Logarithm Problem
N.A. Moldovyan, A.A. Moldovyan
Journal:
Bulletin of the South Ural State University. Series "Mathematical Modelling, Programming and Computer Software"
Volume 12,
Issue 1
(2019),
p. 66
Improved Asymmetric Cipher Based on Matrix Power Function with Provable Security
Eligijus Sakalauskas, Aleksejus Mihalkovich, Algimantas Venčkauskas
Journal:
Symmetry
Volume 9,
Issue 1
(2017),
p. 9
On Eulerian semigroups of multivariate transformations and their cryptographic applications
Journal:
European Journal of Mathematics
Volume 9,
Issue 4
(2023)
On new protocols of Noncommutative Cryptography in terms of homomorphism of stable multivariate transformation groups
Vasyl Ustimenko, Michał Klisowski
Journal:
Algebra and Discrete Mathematics
Volume 35,
Issue 2
(2023),
p. 220
On the security of DLCSP over $$GL_n(\mathbb {F}_q[S_r])$$
Atul Pandey, Indivar Gupta, Dhiraj Kumar Singh
Journal:
Applicable Algebra in Engineering, Communication and Computing
Volume 34,
Issue 4
(2023),
p. 619
One-way functions based on the discrete logarithm problem in the groups meeting conditions C(3)-T(6).
Nikolai Bezverhnii, Olga Chernisheva
Journal:
Science and Education of the Bauman MSTU
Volume 14,
Issue 10
(2014)
Provably secure zero knowledge undeniable signature scheme over non-abelian group
Neha Goel, Indivar Gupta, B K Dass
Journal:
Sādhanā
Volume 48,
Issue 4
(2023)
Security analysis of KAP based on enhanced MPF
Eligijus Sakalauskas, Aleksejus Mihalkovich, Arnas Uselis
Journal:
IET Information Security
Volume 14,
Issue 4
(2020),
p. 410
Undeniable signature scheme based over group ring
Neha Goel, Indivar Gupta, M. K. Dubey, B. K. Dass
Journal:
Applicable Algebra in Engineering, Communication and Computing
Volume 27,
Issue 6
(2016),
p. 523
К анализу некоторых систем открытого распределения ключей, основанных на неабелевых группах
Михаил Михайлович Глухов, Mikhail Mikhailovich Glukhov
Journal:
Математические вопросы криптографии
Volume 1,
Issue 4
(2010),
p. 5