On new multivariate cryptosystems based on hidden Eulerian equations

VA Ustimenko - Доповіді Національної академії наук України, 2017 - irbis-nbuv.gov.ua
We propose new multivariate cryptosystems over an n-dimensional free module over the
arithmetical ring Zm based on the idea of hidden discrete logarithm for Zm*. These …

On computations with Double Schubert Automaton and stable maps of Multivariate Cryptography

V Ustimenko - arXiv preprint arXiv:2108.08288, 2021 - arxiv.org
The families of bijective transformations $ G_n $ of affine space $ K^ n $ over general
commutative ring $ K $ of increasing order with the property of stability will be constructed …

On dynamical systems of large girth or cycle indicator and their applications to multivariate cryptography

V Ustimenko, U Romańczuk - … and Metaheuristics: In the Footsteps of Alan …, 2013 - Springer
We are going to observe special algebraic Turing machines designed for different
assignments of cryptography such as classical symmetric encryption, public key algorithms …

On extremal graph theory, explicit algebraic constructions of extremal graphs and corresponding Turing encryption machines

V Ustimenko, U Romańczuk - … and Metaheuristics: In the Footsteps of Alan …, 2013 - Springer
We observe recent results on the applications of extremal graph theory to cryptography.
Classical Extremal Graph Theory contains Erdős Even Circuite Theorem and other …

On the comparison of cryptographical properties of two different families of graphs with large cycle indicator

M Klisowski, V Ustimenko - Mathematics in Computer Science, 2012 - Springer
The paper is devoted to the implementations of the public key algorithms based on simple
algebraic graphs A (n, K) and D (n, K) defined over the same finite commutative ring K. If K is …

On algebraic graph theory and non-bijective multivariate maps in cryptography

VA Ustimenko - Algebra and Discrete Mathematics, 2015 - mathnet.ru
Special family of non-bijective multivariate maps Fn of Zm n into itself is constructed for n= 2,
3,... and composite m. The map Fn is injective on Ωn={x| x1+ x2+... xn∈ Zm∗} and solution …

On the implementation of new symmetric ciphers based on non-bijective multivariate maps

V Ustymenko, A Wróblewska… - 2018 Federated …, 2018 - ieeexplore.ieee.org
Certain families of graphs can be used to obtain multivariate polynomials for cryptographic
algorithms. In particular, in this paper, we introduce stream ciphers based on non-bijective …

On Graphs Defined by Equations and Cubic Multivariate Public Keys

V Ustimenko, T Chojecki, M Klisowski - Future of Information and …, 2024 - Springer
Graphs of large girth of algebraic nature known in the Theory of Extremal Graphs are known
as efficient instruments for the design of construction of Low Density Parity Check Codes for …

On Extremal Expanding Algebraic Graphs and post-quantum secure delivery of passwords, encryption maps and tools for multivariate digital signatures.

V Ustimenko - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Expanding graphs are known due to their remarkable applications to Computer Science. We
are looking for their applications to Post Quantum Cryptography. One of them is …

[PDF][PDF] On families of stream ciphers based on the approximations of regular forests.

V Ustimenko, O Pustovit - ITTAP, 2023 - ceur-ws.org
Discovery of q-regular forest description in terms of an infinite system of quadratic equations
over finite field Fq had an impact on the development of Graph Based Cryptography and …