References
- Butkovic, P. (2010). Max-Linear Systems: Theory and Algorithms. London: Springer.
- Grigoriev, D., Ponomarenko, I. (2006). Constructions in public-key cryptography over matrix groups. Contemp. Math. Am. Soc. 418:103–119.
- Grigoriev, D., Shpilrain, V. (2014). Tropical cryptography. Commun. Algebra 42(6):2624–2632.
- Habeeb, M., Kahrobaei, D., Koupparis, C., Shpilrain, V. (2013). Public key exchange using semidirect product of (semi)groups. In: ACNS 2013. Lecture Notes in Computer Science, Vol. 7954. Berlin, Heidelberg: Springer. pp. 475–486.
- Kahrobaei, D., Shpilrain, V. (2016). Using semidirect product of (semi)groups in public key cryptography. In: CiE 2016. Lecture Notes in Computer Science, Vol. 9709. Cham: Springer. pp. 132–141.
- Kotov, M., Ushakov, A. (2018). Analysis of a key exchange protocol based on tropical matrix algebra. J. Math. Cryptol. 12:137–141.
- Menezes, A., van Oorschot, P., Vanstone, S. (1996). Handbook of Applied Cryptography. Boca Raton, FL: CRC-Press.