Public-key cryptography based on tropical circular matrices
H Huang, C Li, L Deng - Applied Sciences, 2022 - mdpi.com
Some public-key cryptosystems based on the tropical semiring have been proposed in
recent years because of their increased efficiency, since the multiplication is actually an …
recent years because of their increased efficiency, since the multiplication is actually an …
Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange
X Jiang, H Huang, G Pan - Journal of Cyber Security …, 2023 - journals.riverpublishers.com
A tropical encryption scheme is analyzed in this paper, which uses double key exchange
protocol (KEP). The key exchange protocol is divided into two stages: The first stage of the …
protocol (KEP). The key exchange protocol is divided into two stages: The first stage of the …
Generalized Kotov-Ushakov attack on tropical stickel protocol based on modified tropical circulant matrices
S Alhussaini, C Collett - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Abstract After the Kotov-Ushakov attack on the tropical implementation of Stickel protocol,
various attempts have been made to create a secure variant of such implementation. Some …
various attempts have been made to create a secure variant of such implementation. Some …
[PDF][PDF] Generalized Kotov-Ushakov Attack on Tropical Stickel Protocol Based on Modified Circulants.
S Alhussaini, C Collett, S Sergeev - IACR Cryptol. ePrint Arch., 2023 - researchgate.net
Abstract After the Kotov-Ushakov attack on the tropical implementation of Stickel protocol,
various attempts have been made to create a secure variant of such implementation. Some …
various attempts have been made to create a secure variant of such implementation. Some …
Factorization of tropical matrices
A Niv - Journal of Algebra and Its Applications, 2014 - World Scientific
In contrast to the situation in classical linear algebra, not every tropically non-singular matrix
can be factored into a product of tropical elementary matrices. We do prove the factorizability …
can be factored into a product of tropical elementary matrices. We do prove the factorizability …
A public key encryption scheme based on idempotent semirings
M Durcheva, M Rachev - AIP Conference Proceedings, 2015 - pubs.aip.org
The problem of solving two sided linear equations in the idempotent semirings Rmax and
Rmin has been proved to be reducible to the problem mean payoff game which is of the …
Rmin has been proved to be reducible to the problem mean payoff game which is of the …
Newtonian program analysis via tensor product
Recently, Esparza et al. generalized Newton's method—a numerical-analysis algorithm for
finding roots of real-valued functions—to a method for finding fixed-points of systems of …
finding roots of real-valued functions—to a method for finding fixed-points of systems of …
[HTML][HTML] On pseudo-inverses of matrices and their characteristic polynomials in supertropical algebra
A Niv - Linear Algebra and its Applications, 2015 - Elsevier
The only invertible matrices in tropical algebra are diagonal matrices, permutation matrices
and their products. However, the pseudo-inverse A∇, defined as 1 det(A) adj (A), with …
and their products. However, the pseudo-inverse A∇, defined as 1 det(A) adj (A), with …
[HTML][HTML] Idempotent and tropical mathematics; complexity of algorithms and interval analysis
GL Litvinov - Computers & Mathematics with Applications, 2013 - Elsevier
A very brief introduction to tropical and idempotent mathematics is presented. Tropical
mathematics can be treated as a result of a dequantization of the traditional mathematics as …
mathematics can be treated as a result of a dequantization of the traditional mathematics as …
Generalized Kotov-Ushakov Attack on Tropical Stickel Protocol Based on Modified Tropical Circulant Matrices
S Alhussaini, C Collett, S Sergeev - Kybernetika, 2024 - research.birmingham.ac.uk
Abstract After the Kotov-Ushakov attack on the tropical implementation of Stickel protocol,
various attempts have been made to create a secure variant of such implementation. Some …
various attempts have been made to create a secure variant of such implementation. Some …