2019
DOI: 10.15439/2019f343
|View full text |Cite
|
Sign up to set email alerts
|

Expanding graphs of the Extremal Graph Theory and expanded platforms of Post Quantum Cryptography

Abstract: Explicit constructions in Extremal Graph Theory give appropriate lower bounds for Turan type problems. In the case of prohibited cycles, the explicit constructions can be used for various problems of Information Security. We observe recent applications of algebraic constructions of regular graphs of large girth and graphs with large cycle indicator to Coding Theory and Cryptography. In particular, we present a new multivariate platforms of postquantum Non-commutative Cryptography defined in graph theoretical t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Defined above families plays an important role in Extremal Graph Theory, Theory of LDPC codes and Cryptography. (see [30], [33] and further references).…”
Section: Some Definitions Of Extremal Graph Theorymentioning
confidence: 99%
See 1 more Smart Citation
“…Defined above families plays an important role in Extremal Graph Theory, Theory of LDPC codes and Cryptography. (see [30], [33] and further references).…”
Section: Some Definitions Of Extremal Graph Theorymentioning
confidence: 99%
“…We hope that introduced above graphs ( , * ) and ( , * ) possess interesting extremal and spectral properties Groups ( , ) and ( , ) of cubical transformations of affine space associated with graphs ( , ) and ( , ) are interesting objects of algebraic transformation group theory because of composition of two maps of degree 3 for vast majority of pairs will have degree 9. Constructions and applications of these families of transformations groups are recently observed in [33] where some extensions of these groups are introduced.…”
Section: It Is Clear That the Set Of Indicesmentioning
confidence: 99%
“…They contribute valuable applications of theory of Extremal graphs (see [20]) and Expanding graphs [21] to Theoretical Computer Science. We have been working on applications of these graphs to Cryptography (see [22], [23], [24], [25] and further references). This paper is dedicated to the problem of postquantum secure encryption of rather large files in terms of Multivariate Cryptography but with usage of ideas of Noncommutative Cryptography.…”
Section: Introductionmentioning
confidence: 99%