Quasigroups and their applications in cryptography

D Chauhan, I Gupta, R Verma - Cryptologia, 2021 - Taylor & Francis
Full article: Quasigroups and their applications in cryptography Skip to Main Content Taylor and
Francis Online homepage Taylor and Francis Online homepage Log in | Register Cart 1.Home …

[图书][B] Elements of quasigroup theory and applications

V Shcherbacov - 2017 - taylorfrancis.com
Understanding Interaction is a book that explores the interaction between people and
technology, in the broader context of the relations between the human made and the natural …

[PDF][PDF] Performance analysis of cryptographic hash functions suitable for use in blockchain

A Kuznetsov, I Oleshko, V Tymchenko… - International Journal of …, 2021 - academia.edu
A blockchain, or in other words a chain of transaction blocks, is a distributed database that
maintains an ordered chain of blocks that reliably connect the information contained in them …

Design of crypto primitives based on quasigroups

S Markovski - Quasigroups and Related Systems, 2015 - ibn.idsi.md
Today, the security of the modern world is undoubtedly dependent on the cryptographic
primitives built into the various protocols used for secure communication. Let us mention …

π-Cipher: Authenticated Encryption for Big Data

D Gligoroski, H Mihajloska, S Samardjiska… - Secure IT Systems: 19th …, 2014 - Springer
In today's world of big data and rapidly increasing telecommunications, using secure
cryptographic primitives that are parallelizable and incremental is becoming ever more …

[PDF][PDF] Isotopy of Latin squares in cryptography

O Grošek, M Sýs - Tatra Mountains Mathematical Publications, 2010 - sciendo.com
We present a new algorithm for a decision problem if two Latin squares are isotopic. Our
modification has the same complexity as Miller's algorithm, but in many practical situations is …

[HTML][HTML] Латинские квадраты и их применение в криптографии

МЭ Тужилин - Прикладная дискретная математика, 2012 - cyberleninka.ru
В настоящее время в качестве множества M обычно берется множество натуральных
чисел от 1 до n, однако Леонард Эйлер (1707–1783) использовал буквы латинского …

Automatic search of impossible differentials and zero-correlation linear hulls for ARX ciphers

K Zhang, J Guan, B Hu - China Communications, 2018 - ieeexplore.ieee.org
In lightweight cryptographic primitives, round functions with only simple operations XOR,
modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX …

О порождении -квазигрупп с помощью правильных семейств функций

АВ Галатенко, ВА Носов, АЕ Панкратьев… - Дискретная …, 2023 - mathnet.ru
Конечные квазигруппы и n-квазигруппы являются перспективной платформой для
реализации криптоалгоритмов. Одна из актуальных задач заключается в эффективном …

Constructing -bit permutations, -bit involutions and -bit orthomorphisms with almost optimal cryptographic parameters

RA De La Krus Khimenes - Математические вопросы криптографии, 2021 - mathnet.ru
Nonlinear bijective transformations are crucial components in the design of many symmetric
ciphers. To construct permutations having cryptographic properties close to the optimal ones …