This chapter offers an overview of new developments in quasigroup-based cryptography, especially of new defined quasigroup-based block ciphers and stream ciphers, hash functions and message authentication codes, PRNGs, public key cryptosystems, etc. Special attention is given to Multivariate Quadratic Quasigroups (MQQs) and MQQ public key schemes, because of their potential to become one of the most efficient pubic key algorithms today. There are also directions of using MQQs for building Zero knowledge ID-based identification schemes. Recent research activities show that some existing non-quasigroup block ciphers or their building blocks can be represented by quasigroup string transformations. There is a method for generating optimal 4x4 ...
International audienceMQQ is a multivariate cryptosystem based on multivariate quadratic quasigroups...
International audienceMQQ is a multivariate cryptosystem based on multivariate quadratic quasigroups...
Quasigroup operations are essential for a wide range of cryptographic procedures that includes crypt...
Public-key cryptographic schemes based on the complexity of solving multivariate quadratic equations...
Abstract. Public Key Cryptosystems have been in use for more than three decades. A number of schemes...
Cryptology is the science of secret communication, which consists of two complementary disciplines: ...
Quasigroups are algebraic structures closely related to Latin squares which have many different appl...
In this research we focus on the analysis of the Quasigroup Block Cipher co-developed by Dr. Parakh ...
The quasigroup string transformations have been used for defining several crypto primitives. Based o...
AMS Subj. Classification: Primary 20N05, Secondary 94A60The intention of this research is to justify ...
The security of almost all public-key cryptography is based on some computationally hard problem. Mo...
Abstract. We investigate the security of the family of MQQ public key cryptosystems using multivari-...
This research discusses application of quasigroup in the field of cryptography. A quasigroup operati...
Abstract: A method of generating a practically unlimited number of quasigroups of a (theoretically...
International audienceMQQ is a multivariate public key cryptosystem (MPKC) based on multivariate qua...
International audienceMQQ is a multivariate cryptosystem based on multivariate quadratic quasigroups...
International audienceMQQ is a multivariate cryptosystem based on multivariate quadratic quasigroups...
Quasigroup operations are essential for a wide range of cryptographic procedures that includes crypt...
Public-key cryptographic schemes based on the complexity of solving multivariate quadratic equations...
Abstract. Public Key Cryptosystems have been in use for more than three decades. A number of schemes...
Cryptology is the science of secret communication, which consists of two complementary disciplines: ...
Quasigroups are algebraic structures closely related to Latin squares which have many different appl...
In this research we focus on the analysis of the Quasigroup Block Cipher co-developed by Dr. Parakh ...
The quasigroup string transformations have been used for defining several crypto primitives. Based o...
AMS Subj. Classification: Primary 20N05, Secondary 94A60The intention of this research is to justify ...
The security of almost all public-key cryptography is based on some computationally hard problem. Mo...
Abstract. We investigate the security of the family of MQQ public key cryptosystems using multivari-...
This research discusses application of quasigroup in the field of cryptography. A quasigroup operati...
Abstract: A method of generating a practically unlimited number of quasigroups of a (theoretically...
International audienceMQQ is a multivariate public key cryptosystem (MPKC) based on multivariate qua...
International audienceMQQ is a multivariate cryptosystem based on multivariate quadratic quasigroups...
International audienceMQQ is a multivariate cryptosystem based on multivariate quadratic quasigroups...
Quasigroup operations are essential for a wide range of cryptographic procedures that includes crypt...