199
Views
19
CrossRef citations to date
0
Altmetric
Articles

Tropical cryptography II: Extensions by homomorphisms

&
Pages 4224-4229 | Received 21 Nov 2018, Accepted 13 Jan 2019, Published online: 04 Apr 2019

References

  • Butkovic, P. (2010). Max-Linear Systems: Theory and Algorithms. London: Springer.
  • Grigoriev, D., Ponomarenko, I. (2006). Constructions in public-key cryptography over matrix groups. Contemp. Math. Am. Soc. 418:103–119.
  • Grigoriev, D., Shpilrain, V. (2014). Tropical cryptography. Commun. Algebra 42(6):2624–2632.
  • Habeeb, M., Kahrobaei, D., Koupparis, C., Shpilrain, V. (2013). Public key exchange using semidirect product of (semi)groups. In: ACNS 2013. Lecture Notes in Computer Science, Vol. 7954. Berlin, Heidelberg: Springer. pp. 475–486.
  • Kahrobaei, D., Shpilrain, V. (2016). Using semidirect product of (semi)groups in public key cryptography. In: CiE 2016. Lecture Notes in Computer Science, Vol. 9709. Cham: Springer. pp. 132–141.
  • Kotov, M., Ushakov, A. (2018). Analysis of a key exchange protocol based on tropical matrix algebra. J. Math. Cryptol. 12:137–141.
  • Menezes, A., van Oorschot, P., Vanstone, S. (1996). Handbook of Applied Cryptography. Boca Raton, FL: CRC-Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.