[HTML][HTML] Public-key cryptography based on tropical circular matrices

H Huang, C Li, L Deng - Applied Sciences, 2022 - mdpi.com
Some public-key cryptosystems based on the tropical semiring have been proposed in
recent years because of their increased efficiency, since the multiplication is actually an …

Two general schemes of algebraic cryptography

V Roman'kov - Groups Complexity Cryptology, 2018 - degruyter.com
In this paper, we introduce two general schemes of algebraic cryptography. We show that
many of the systems and protocols considered in literature that use two-sided multiplications …

[BOEK][B] Algebraic methods for constructing one-way trapdoor functions

G Maze - 2003 - search.proquest.com
In this dissertation, we consider an extension of the discrete logarithm problem to the case of
a semigroup acting on a finite set: the Semigroup Action Problem (SAP). New protocols and …

Tropical cryptography based on multiple exponentiation problem of matrices

H Huang, C Li - Security and Communication Networks, 2022 - Wiley Online Library
Because there is no multiplication of numbers in tropical algebra and the problem of solving
the systems of polynomial equations in tropical algebra is NP‐hard, in recent years some …

Public key cryptosystem based on max-semirings

MI Durcheva, ID Trendafilov - AIP conference proceedings, 2012 - pubs.aip.org
When we replace addition and multiplication of real numbers by the operations of taking the
maximum of two numbers and of adding two numbers respectively, we obtain the so-called …

[HTML][HTML] Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices

H Huang - Symmetry, 2022 - mdpi.com
Recently, public-key cryptography based on tropical semi-rings have been proposed.
However, the majority of them are damaged. The main reason is that they use a public …

Asymmetric Cryptography Based on the Tropical Jones Matrix

H Huang, W Kong, T Xu - Symmetry, 2024 - mdpi.com
In recent years, the tropical polynomial factorization problem, the tropical matrix
decomposition problem, and the tropical multivariate quadratic equation solving problem …

Reduction of the semigroup-action problem on a module to the hidden-subgroup problem

H Huang, C Peng, L Deng - Quantum Information Processing, 2024 - Springer
The discrete-logarithm problem and related problems are important in public-key
cryptography; however, these problems can be reduced to the hidden-subgroup problem …

Public key cryptosystem based on two sided action of different Exotic semirings

M Durcheva - Journal of Mathematics and System Science, 2014 - search.proquest.com
The idempotent semirings Rmax and Rmin play a crucial role in several areas of
mathematics and their applications such as discrete mathematics, algebraic geometry …

Geometric key establishment

A Berenstein, L Chernyak - Cryptology ePrint Archive, 2004 - eprint.iacr.org
We propose a new class of key establishment schemes which are based on geometric
generalizations of the classical Diffie-Hellman. The simplest of our schemes–based on the …