199
Views
19
CrossRef citations to date
0
Altmetric
Articles

Tropical cryptography II: Extensions by homomorphisms

&
Pages 4224-4229 | Received 21 Nov 2018, Accepted 13 Jan 2019, Published online: 04 Apr 2019

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (5)

K. Ahmed, S. Pal & R. Mohan. (2023) A review of the tropical approach in cryptography. Cryptologia 47:1, pages 63-87.
Read now
K. Ahmed, S. Pal & R. Mohan. (2023) Key exchange protocol based upon a modified tropical structure. Communications in Algebra 51:1, pages 214-223.
Read now
Any Muanalifah & Sergeĭ Sergeev. (2022) On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product. Communications in Algebra 50:2, pages 861-879.
Read now
Steve Isaac & Delaram Kahrobaei. (2021) A closer look at the tropical cryptography. International Journal of Computer Mathematics: Computer Systems Theory 6:2, pages 137-142.
Read now
Sulaiman Alhussaini, Craig Collett & Sergeĭ Sergeev. On the tropical two-sided discrete logarithm and a key exchange protocol based on the tropical algebra of pairs. Communications in Algebra 0:0, pages 1-24.
Read now

Articles from other publishers (14)

Huawei Huang, Weisha Kong & Ting Xu. (2024) Asymmetric Cryptography Based on the Tropical Jones Matrix. Symmetry 16:4, pages 456.
Crossref
Martin Rachev & Ivan Trendafilov. (2024) Amitsur's theorem, semicentral idempotents, and additively idempotent semirings. Open Mathematics 22:1.
Crossref
Mikhail Khovanov, Maithreya Sitaraman & Daniel Tubbenhauer. (2024) Monoidal categories, representation gap and cryptography. Transactions of the American Mathematical Society, Series B 11:10, pages 329-395.
Crossref
利萍 张. (2024) Study on 2 × 2 Quasi-Invertible Matrices over S<sub>max</sub>. Pure Mathematics 14:01, pages 341-346.
Crossref
Ponmaheshkumar A & Perumal R. (2023) Toeplitz matrices based key exchange protocol for the internet of things. International Journal of Information Technology 16:1, pages 293-300.
Crossref
Ivan Buchinskiy, Matvei Kotov & Alexander Treier. (2023) An attack on a key exchange protocol based on max-times and min-times algebras. Indian Journal of Pure and Applied Mathematics.
Crossref
B. Amutha & R. Perumal. (2023) Public key exchange protocols based on tropical lower circulant and anti circulant matrices. AIMS Mathematics 8:7, pages 17307-17334.
Crossref
Huawei Huang. (2022) Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices. Symmetry 14:11, pages 2378.
Crossref
Huawei Huang & Chunhua Li. (2022) Tropical Cryptography Based on Multiple Exponentiation Problem of Matrices. Security and Communication Networks 2022, pages 1-9.
Crossref
Kashif Ahmed, Saibal Pal & Radha Mohan. (2021) Some new semiring structures. Asian-European Journal of Mathematics 15:09.
Crossref
Huawei Huang, Chunhua Li & Lunzhi Deng. (2022) Public-Key Cryptography Based on Tropical Circular Matrices. Applied Sciences 12:15, pages 7401.
Crossref
Nael Rahman & Vladimir Shpilrain. (2022) MAKE: A matrix action key exchange. Journal of Mathematical Cryptology 16:1, pages 64-72.
Crossref
Nikolai Krivulin. (2021) Algebraic Solution of Tropical Polynomial Optimization Problems. Mathematics 9:19, pages 2472.
Crossref
Dylan Rudy & Chris Monico. (2020) Remarks on a Tropical Key Exchange System. Journal of Mathematical Cryptology 15:1, pages 280-283.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.