On linguistic dynamical systems, families of graphs of large girth, and cryptography

VA Ustimenko - Journal of Mathematical Sciences, 2007 - Springer
The paper is devoted to the study of a linguistic dynamical system of dimension n≥ 2 over
an arbitrary commutative ring K, ie, a family F of nonlinear polynomial maps f α: K n→ K n …

On graph-based cryptography and symbolic computations

VA Ustimenko - Serdica Journal of Computing, 2007 - serdica-comp.math.bas.bg
We have been investigating the cryptographical properties of in nite families of simple
graphs of large girth with the special colouring of vertices during the last 10 years. Such …

Context-aware prediction model for offloading mobile application tasks to mobile cloud environments

HA Jadad, A Touzene, K Day, N Alziedi… - International Journal of …, 2019 - igi-global.com
Offloading intensive computation parts of the mobile application code to the cloud computing
is a promising way to enhance the performance of the mobile device and save the battery …

On the extremal graph theory for directed graphs and its cryptographical applications

VA Ustimenko - Advances in Coding Theory and Cryptography, 2007 - World Scientific
The paper is devoted to the graph based cryptography. The girth of a directed graph (girth
indicator) is defined via its smallest commutative diagram. The analogue of Erdøos's Even …

On algebraic graph theory and non-bijective multivariate maps in cryptography

VA Ustimenko - Algebra and Discrete Mathematics, 2015 - mathnet.ru
Special family of non-bijective multivariate maps Fn of Zm n into itself is constructed for n= 2,
3,... and composite m. The map Fn is injective on Ωn={x| x1+ x2+... xn∈ Zm∗} and solution …

On the implementation of cryptoalgorithms based on algebraic graphs over some commutative rings

JS Kotorowicz, VA Ustimenko - Condensed Matter Physics, 2008 - dspace.nbuv.gov.ua
The paper is devoted to computer implementation of some graph based stream ciphers. We
compare the time performance of this new algorithm with fast, but no very secure RC4, and …

On the implementations of new graph based cubic Multivariate Public Keys

V Ustimenko, T Chojecki… - 2023 18th Conference on …, 2023 - ieeexplore.ieee.org
Algebraic Constructions of Extremal Graph Theory were efficiently used for the construction
of Low Density Parity Check Codes for satellite communication, constructions of stream …

On small world semiplanes with generalised Schubert cells

V Futorny, V Ustimenko - Acta Applicandae Mathematicae, 2007 - Springer
The well known “real-life examples” of small world graphs, including the graph of binary
relation:“two persons on the earth know each other” contains cliques, so they have cycles of …

On the implementation of new symmetric ciphers based on non-bijective multivariate maps

V Ustymenko, A Wróblewska… - 2018 Federated …, 2018 - ieeexplore.ieee.org
Certain families of graphs can be used to obtain multivariate polynomials for cryptographic
algorithms. In particular, in this paper, we introduce stream ciphers based on non-bijective …

Graph based private key crypto-system

A Touzene, V Ustimenko - Computer Science Research Trends, 2008 - books.google.com
Our symmetric key crypto-system is based on walks on a bipartite graph. The general idea is
to treat vertices of a graph as messages and arcs of a certain length as an encryption tool …