We have been investigating the cryptographical properties of in nite families of simple graphs of large girth with the special colouring of vertices during the last 10 years. Such families can be used for the development of cryptographical algorithms (on symmetric or public key modes) and turbocodes in error correction theory. Only few families of simple graphs of large unbounded girth and arbitrarily large degree are known. The paper is devoted to the more general theory of directed graphs of large girth and their cryptographical applications. It contains new explicit algebraic constructions of in finite families of such graphs. We show that they can be used for the implementation of secure and very fast symmetric encryption algorithms. Th...
Cryptography is a necessary tool for secrecy in our increasingly connected and data-driven world. As...
© 2018 IEEE. The use of cryptography systems in cyber security domain has become a primary focus to ...
AbstractWe propose a couple of general ways of constructing authentication schemes from actions of a...
Families of edge transitive algebraic graphs defined over finite commutative rings were used for the...
Algebraic graphs D(n, q) and their analog graphs D(n, K), where K is a finite commutative ring were ...
Cryptography courses are very popular among students around the globe. I started this teaching subje...
Generalized Selective Decryption (GSD), introduced by Panjwani [TCC’07], is a game for a symmetric e...
Generalized Selective Decryption (GSD), introduced by Panjwani [TCC’07], is a game for a symmetric e...
This thesis explores two different approaches to reduce the size of the public key cryptosystems bas...
Homogeneous algebraic graphs defined over arbitrary field are classical objects of Algebraic Geometr...
We design cryptographical graphs for information security by the following principles: (1) be used c...
We study the following broad question about cryptographic primitives: is it possible to achieve secu...
Computer-aided verification provides effective means of analyzing the security of cryptographic prim...
The paper is devoted to computer implementation of some graph based stream ciphers. We compare the t...
This article belongs to the Special Issue Public Key Cryptography.In 2008, Doliskani et al. proposed...
Cryptography is a necessary tool for secrecy in our increasingly connected and data-driven world. As...
© 2018 IEEE. The use of cryptography systems in cyber security domain has become a primary focus to ...
AbstractWe propose a couple of general ways of constructing authentication schemes from actions of a...
Families of edge transitive algebraic graphs defined over finite commutative rings were used for the...
Algebraic graphs D(n, q) and their analog graphs D(n, K), where K is a finite commutative ring were ...
Cryptography courses are very popular among students around the globe. I started this teaching subje...
Generalized Selective Decryption (GSD), introduced by Panjwani [TCC’07], is a game for a symmetric e...
Generalized Selective Decryption (GSD), introduced by Panjwani [TCC’07], is a game for a symmetric e...
This thesis explores two different approaches to reduce the size of the public key cryptosystems bas...
Homogeneous algebraic graphs defined over arbitrary field are classical objects of Algebraic Geometr...
We design cryptographical graphs for information security by the following principles: (1) be used c...
We study the following broad question about cryptographic primitives: is it possible to achieve secu...
Computer-aided verification provides effective means of analyzing the security of cryptographic prim...
The paper is devoted to computer implementation of some graph based stream ciphers. We compare the t...
This article belongs to the Special Issue Public Key Cryptography.In 2008, Doliskani et al. proposed...
Cryptography is a necessary tool for secrecy in our increasingly connected and data-driven world. As...
© 2018 IEEE. The use of cryptography systems in cyber security domain has become a primary focus to ...
AbstractWe propose a couple of general ways of constructing authentication schemes from actions of a...