86
Views
9
CrossRef citations to date
0
Altmetric
Research Article

A closer look at the tropical cryptography

&
Pages 137-142 | Received 17 Jul 2020, Accepted 14 Nov 2020, Published online: 28 Jan 2021

References

  • F. Baccelli, G.A. Cohen, G.J. Olsder, and J.-P. Quadrat, Synchronization and linearity: an algebra for discrete event systems, J. Oper. Res. Soc. 45 (1994), pp. 118–119.
  • P. Butkovič, Max-Linear Systems: Theory and Algorithms, Springer Science & Business Media, London, 2010.
  • D. Grigoriev and V. Shpilrain, Tropical cryptography ii: extensions by homomorphisms, Commun. Algebra 47(10) (2019), pp. 4224–4229.
  • M. Habeeb, D. Kahrobaei, C. Koupparis, and V. Shpilrain, Public key exchange using semidirect product of (semi)groups, in Applied Cryptography and Network Security, Springer, Berlin Heidelberg, 2013, pp. 475–486. ISBN: 978-3-642-38980-1.
  • S. Isaac, “Implementation of protocol and attack.” https://github.com/steveisaac/TropicalCryptography.
  • D. Kahrobaei and V. Shpilrain, Using Semidirect Product of (Semi) Groups in Public Key Cryptography, Conference on Computability in Europe, Springer, 2016, pp. 132–141.
  • M. Kotov and A. Ushakov, Analysis of a key exchange protocol based on tropical matrix algebra, J. Math. Cryptol. 12 (2015), pp. 137–141.
  • K. Nachtigall, Powers of matrices over an extremal algebra with applications to periodic graphs, Math. Methods Oper. Res. 46(1) (1997), pp. 87–102.
  • D. Rudy and C. Monico, Remarks on a tropical key exchange system, arXiv e-prints, (May 2020). arXiv: 2005.04363 [cs.CR].

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.