Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review of the tropical approach in cryptography
K Ahmed, S Pal, R Mohan - Cryptologia, 2023 - Taylor & Francis
Full article: A review of the tropical approach in cryptography Skip to Main Content Taylor and
Francis Online homepage Browse Search Publish Login | Register Log in or Register Login …
Francis Online homepage Browse Search Publish Login | Register Log in or Register Login …
[PDF][PDF] Another cryptanalysis of a tropical key exchange protocol
In this paper, we undertake a comprehensive analysis of the Two-party public key exchange
protocol proposed by Grigoriev & Shpilrain in 2019 which is intriguingly based on the …
protocol proposed by Grigoriev & Shpilrain in 2019 which is intriguingly based on the …
Two party key exchange protocol based on duo circulant matrices for the IoT environment
This paper proposes a new two-party key exchange protocol based on the max-plus
semiring, which is the set of matrices over the set of integers along with negative infinity. We …
semiring, which is the set of matrices over the set of integers along with negative infinity. We …
Analysis of four protocols based on tropical circulant matrices
I Buchinskiy, M Kotov, A Treier - Indian Journal of Pure and Applied …, 2024 - Springer
Several key exchange protocols based on tropical circulant matrices were proposed in the
last two years. In this paper, we show that protocols offered by Durcheva (Eur J Inf Technol …
last two years. In this paper, we show that protocols offered by Durcheva (Eur J Inf Technol …
TrES: tropical encryption scheme based on double key exchange
MI Durcheva - European Journal of Information Technologies and …, 2022 - ej-compute.org
Shor's quantum algorithm establishes a polynomial time attack on the discrete logarithm
problem in any group. Recent announcements of progress in building quantum computers …
problem in any group. Recent announcements of progress in building quantum computers …
Enhancing vehicle IoT security through matrix power functions in supertropical semiring.
The growing ecosystem of Internet of Things (IoT) devices in the automotive industry
demands innovative solutions for secure communication and data exchange. In this context …
demands innovative solutions for secure communication and data exchange. In this context …
Key exchange protocol based upon a modified tropical structure
K Ahmed, S Pal, R Mohan - Communications in Algebra, 2023 - Taylor & Francis
In this article, we make use of an algebraic structure that is derived from a tropical semiring
and present a key exchange scheme based on it. This is followed by a security analysis of …
and present a key exchange scheme based on it. This is followed by a security analysis of …
On the complexity of the problem of solving systems of tropical polynomial equations of degree two
IM Buchinskiy, MV Kotov, AV Treier - International Conference on …, 2024 - Springer
In this paper, we investigate the computational complexity of the problem of solving a one-
sided system of equations of degree two of a special form over the max-plus algebra. Also …
sided system of equations of degree two of a special form over the max-plus algebra. Also …
Public key cryptography with max-plus matrices and polynomials
MI Durcheva - AIP Conference Proceedings, 2013 - pubs.aip.org
Employing exotic semirings as platforms for several cryptographic schemes arose several
years ago. Exotic semirings are additively idempotent semirings where the elements are …
years ago. Exotic semirings are additively idempotent semirings where the elements are …
A secure key exchange protocol for Industrial Internet of Things based on tropical triad matrix semiring
The rapidly growing sector of the Industrial Internet of Things (IIoT) requires strong security
protocols for the transmission and sharing of information. The article presents a novel …
protocols for the transmission and sharing of information. The article presents a novel …