References
- F. Baccelli, G.A. Cohen, G.J. Olsder, and J.-P. Quadrat, Synchronization and linearity: an algebra for discrete event systems, J. Oper. Res. Soc. 45 (1994), pp. 118–119.
- P. Butkovič, Max-Linear Systems: Theory and Algorithms, Springer Science & Business Media, London, 2010.
- D. Grigoriev and V. Shpilrain, Tropical cryptography ii: extensions by homomorphisms, Commun. Algebra 47(10) (2019), pp. 4224–4229.
- M. Habeeb, D. Kahrobaei, C. Koupparis, and V. Shpilrain, Public key exchange using semidirect product of (semi)groups, in Applied Cryptography and Network Security, Springer, Berlin Heidelberg, 2013, pp. 475–486. ISBN: 978-3-642-38980-1.
- S. Isaac, “Implementation of protocol and attack.” https://github.com/steveisaac/TropicalCryptography.
- D. Kahrobaei and V. Shpilrain, Using Semidirect Product of (Semi) Groups in Public Key Cryptography, Conference on Computability in Europe, Springer, 2016, pp. 132–141.
- M. Kotov and A. Ushakov, Analysis of a key exchange protocol based on tropical matrix algebra, J. Math. Cryptol. 12 (2015), pp. 137–141.
- K. Nachtigall, Powers of matrices over an extremal algebra with applications to periodic graphs, Math. Methods Oper. Res. 46(1) (1997), pp. 87–102.
- D. Rudy and C. Monico, Remarks on a tropical key exchange system, arXiv e-prints, (May 2020). arXiv: 2005.04363 [cs.CR].