On graph-based cryptography and symbolic computations

VA Ustimenko - Serdica Journal of Computing, 2007 - serdica-comp.math.bas.bg
We have been investigating the cryptographical properties of in nite families of simple
graphs of large girth with the special colouring of vertices during the last 10 years. Such …

On the extremal graph theory for directed graphs and its cryptographical applications

VA Ustimenko - Advances in Coding Theory and Cryptography, 2007 - World Scientific
The paper is devoted to the graph based cryptography. The girth of a directed graph (girth
indicator) is defined via its smallest commutative diagram. The analogue of Erdøos's Even …

On the homogeneous algebraic graphs of large girth and their applications

T Shaska, V Ustimenko - Linear algebra and its applications, 2009 - Elsevier
Families of finite graphs of large girth were introduced in classical extremal graph theory.
One important theoretical result here is the upper bound on the maximal size of the graph …

On the comparison of cryptographical properties of two different families of graphs with large cycle indicator

M Klisowski, V Ustimenko - Mathematics in Computer Science, 2012 - Springer
The paper is devoted to the implementations of the public key algorithms based on simple
algebraic graphs A (n, K) and D (n, K) defined over the same finite commutative ring K. If K is …

On algebraic graph theory and non-bijective multivariate maps in cryptography

VA Ustimenko - Algebra and Discrete Mathematics, 2015 - mathnet.ru
Special family of non-bijective multivariate maps Fn of Zm n into itself is constructed for n= 2,
3,... and composite m. The map Fn is injective on Ωn={x| x1+ x2+... xn∈ Zm∗} and solution …

On the implementation of cryptoalgorithms based on algebraic graphs over some commutative rings

JS Kotorowicz, VA Ustimenko - Condensed Matter Physics, 2008 - dspace.nbuv.gov.ua
The paper is devoted to computer implementation of some graph based stream ciphers. We
compare the time performance of this new algorithm with fast, but no very secure RC4, and …

On the implementations of new graph based cubic Multivariate Public Keys

V Ustimenko, T Chojecki… - 2023 18th Conference on …, 2023 - ieeexplore.ieee.org
Algebraic Constructions of Extremal Graph Theory were efficiently used for the construction
of Low Density Parity Check Codes for satellite communication, constructions of stream …

On small world semiplanes with generalised Schubert cells

V Futorny, V Ustimenko - Acta Applicandae Mathematicae, 2007 - Springer
The well known “real-life examples” of small world graphs, including the graph of binary
relation:“two persons on the earth know each other” contains cliques, so they have cycles of …

On the implementation of new symmetric ciphers based on non-bijective multivariate maps

V Ustymenko, A Wróblewska… - 2018 Federated …, 2018 - ieeexplore.ieee.org
Certain families of graphs can be used to obtain multivariate polynomials for cryptographic
algorithms. In particular, in this paper, we introduce stream ciphers based on non-bijective …

On the cryptographical properties of extremal algebraic graphs

V Ustimenko - Algebraic Aspects of Digital Communications, 2009 - ebooks.iospress.nl
In this paper we consider some properties of stream ciphers related to arithmetical
dynamical systems defined in [41] over commutative ring K. We modify the stream cipher …