Quasigroups and their applications in cryptography

D Chauhan, I Gupta, R Verma - Cryptologia, 2021 - Taylor & Francis
Full article: Quasigroups and their applications in cryptography Skip to Main Content Taylor and
Francis Online homepage Taylor and Francis Online homepage Log in | Register Cart 1.Home …

[图书][B] Elements of quasigroup theory and applications

V Shcherbacov - 2017 - taylorfrancis.com
Understanding Interaction is a book that explores the interaction between people and
technology, in the broader context of the relations between the human made and the natural …

The algebra of entanglement and the geometry of composition

A Hadzihasanovic - arXiv preprint arXiv:1709.08086, 2017 - arxiv.org
String diagrams turn algebraic equations into topological moves that have recurring shapes,
involving the sliding of one diagram past another. We individuate, at the root of this fact, the …

Design of crypto primitives based on quasigroups

S Markovski - Quasigroups and Related Systems, 2015 - ibn.idsi.md
Today, the security of the modern world is undoubtedly dependent on the cryptographic
primitives built into the various protocols used for secure communication. Let us mention …

Fiducial theory and optimal inference

G Taraldsen, BH Lindqvist - The Annals of Statistics, 2013 - JSTOR
It is shown that the fiducial distribution in a group model, or more generally a quasigroup
model, determines the optimal equivariant frequentist inference procedures. The proof does …

[HTML][HTML] Characterization of polynomially complete quasigroups based on Latin squares for cryptographic transformations

VA Artamonov, S Chakrabarti, SK Pal - Discrete Applied Mathematics, 2016 - Elsevier
We characterize polynomially complete quasigroups of order 4 from their corresponding
Latin squares. This class of quasigroups is the suitable choice for cryptographic applications …

Group matrices, group determinants and representation theory

KW Johnson - Lecture Notes in Mathematics, 2019 - Springer
In 1896, after correspondence with Dedekind, Frobenius published two papers in which
group character theory was introduced and was used to describe the factorization of the …

Two general schemes of algebraic cryptography

V Roman'kov - Groups Complexity Cryptology, 2018 - degruyter.com
In this paper, we introduce two general schemes of algebraic cryptography. We show that
many of the systems and protocols considered in literature that use two-sided multiplications …

On Latin squares of polynomially complete quasigroups and quasigroups generated by shifts

V Artamonov, S Chakrabarti… - … and Related Systems, 2013 - ibn.idsi.md
We develop some methods and algorithms for checking the polynomial completeness
property of some nite quasigroups by considering their corresponding Latin square …

Cryptographic hash function Edon-R′

D Gligoroski, RS Ødegård, M Mihova… - 2009 Proceedings of …, 2009 - ieeexplore.ieee.org
In this paper we describe in details the tweaked cryptographic hash function Edon-R that we
denote as EDON-R'. EDON-R'was submitted as a candidate for SHA-3 hash competition …