A review of the tropical approach in cryptography

K Ahmed, S Pal, R Mohan - Cryptologia, 2023 - Taylor & Francis
Full article: A review of the tropical approach in cryptography Skip to Main Content Taylor and
Francis Online homepage Browse Search Publish Login | Register Log in or Register Login …

[PDF][PDF] Another cryptanalysis of a tropical key exchange protocol

J Jackson, R Perumal - IAENG Int J Comput Sci, 2023 - iaeng.org
In this paper, we undertake a comprehensive analysis of the Two-party public key exchange
protocol proposed by Grigoriev & Shpilrain in 2019 which is intriguingly based on the …

Two party key exchange protocol based on duo circulant matrices for the IoT environment

B Amutha, R Perumal - International Journal of Information Technology, 2024 - Springer
This paper proposes a new two-party key exchange protocol based on the max-plus
semiring, which is the set of matrices over the set of integers along with negative infinity. We …

Analysis of four protocols based on tropical circulant matrices

I Buchinskiy, M Kotov, A Treier - Indian Journal of Pure and Applied …, 2024 - Springer
Several key exchange protocols based on tropical circulant matrices were proposed in the
last two years. In this paper, we show that protocols offered by Durcheva (Eur J Inf Technol …

TrES: tropical encryption scheme based on double key exchange

MI Durcheva - European Journal of Information Technologies and …, 2022 - ej-compute.org
Shor's quantum algorithm establishes a polynomial time attack on the discrete logarithm
problem in any group. Recent announcements of progress in building quantum computers …

Enhancing vehicle IoT security through matrix power functions in supertropical semiring.

A Ponmaheshkumar, R Perumal - … in Engineering, Science & …, 2024 - search.ebscohost.com
The growing ecosystem of Internet of Things (IoT) devices in the automotive industry
demands innovative solutions for secure communication and data exchange. In this context …

Key exchange protocol based upon a modified tropical structure

K Ahmed, S Pal, R Mohan - Communications in Algebra, 2023 - Taylor & Francis
In this article, we make use of an algebraic structure that is derived from a tropical semiring
and present a key exchange scheme based on it. This is followed by a security analysis of …

On the complexity of the problem of solving systems of tropical polynomial equations of degree two

IM Buchinskiy, MV Kotov, AV Treier - International Conference on …, 2024 - Springer
In this paper, we investigate the computational complexity of the problem of solving a one-
sided system of equations of degree two of a special form over the max-plus algebra. Also …

Public key cryptography with max-plus matrices and polynomials

MI Durcheva - AIP Conference Proceedings, 2013 - pubs.aip.org
Employing exotic semirings as platforms for several cryptographic schemes arose several
years ago. Exotic semirings are additively idempotent semirings where the elements are …

A secure key exchange protocol for Industrial Internet of Things based on tropical triad matrix semiring

J Jackson, R Perumal - International Journal of Information Technology, 2024 - Springer
The rapidly growing sector of the Industrial Internet of Things (IIoT) requires strong security
protocols for the transmission and sharing of information. The article presents a novel …