Quasigroups and their applications in cryptography

D Chauhan, I Gupta, R Verma - Cryptologia, 2021 - Taylor & Francis
Full article: Quasigroups and their applications in cryptography Skip to Main Content Taylor and
Francis Online homepage Browse Search Publish Login | Register Log in or Register Login …

[КНИГА][B] Elements of quasigroup theory and applications

V Shcherbacov - 2017 - taylorfrancis.com
Understanding Interaction is a book that explores the interaction between people and
technology, in the broader context of the relations between the human made and the natural …

[PDF][PDF] Performance analysis of cryptographic hash functions suitable for use in blockchain

A Kuznetsov, I Oleshko, V Tymchenko… - International Journal of …, 2021 - academia.edu
A blockchain, or in other words a chain of transaction blocks, is a distributed database that
maintains an ordered chain of blocks that reliably connect the information contained in them …

Design of crypto primitives based on quasigroups

S Markovski - Quasigroups and Related Systems, 2015 - ibn.idsi.md
Today, the security of the modern world is undoubtedly dependent on the cryptographic
primitives built into the various protocols used for secure communication. Let us mention …

Латинские квадраты и их применение в криптографии

МЭ Тужилин - Прикладная дискретная математика, 2012 - cyberleninka.ru
В настоящее время в качестве множества M обычно берется множество натуральных
чисел от 1 до n, однако Леонард Эйлер (1707–1783) использовал буквы латинского …

π-Cipher: Authenticated Encryption for Big Data

D Gligoroski, H Mihajloska, S Samardjiska… - Secure IT Systems: 19th …, 2014 - Springer
In today's world of big data and rapidly increasing telecommunications, using secure
cryptographic primitives that are parallelizable and incremental is becoming ever more …

[PDF][PDF] Isotopy of Latin squares in cryptography

OGM Sýs - Tatra Mt. Math. Publ, 2010 - sciendo.com
We present a new algorithm for a decision problem if two Latin squares are isotopic. Our
modification has the same complexity as Miller's algorithm, but in many practical situations is …

Automatic search of impossible differentials and zero-correlation linear hulls for ARX ciphers

K Zhang, J Guan, B Hu - China Communications, 2018 - ieeexplore.ieee.org
In lightweight cryptographic primitives, round functions with only simple operations XOR,
modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX …

Algorithms for Checking Some Properties of n-Quasigroups

AV Galatenko, AE Pankratiev… - … and Computer Software, 2022 - Springer
Efficient algorithms for checking some properties of n-quasigroups that are important from
the cryptography point of view are described. These are the properties of polynomial …

Constructing -bit permutations, -bit involutions and -bit orthomorphisms with almost optimal cryptographic parameters

RA De La Krus Khimenes - Математические вопросы криптографии, 2021 - mathnet.ru
Nonlinear bijective transformations are crucial components in the design of many symmetric
ciphers. To construct permutations having cryptographic properties close to the optimal ones …