{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T15:10:05Z","timestamp":1743865805380,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":62,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642296932"},{"type":"electronic","value":"9783642296949"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-29694-9_10","type":"book-chapter","created":{"date-parts":[[2012,7,26]],"date-time":"2012-07-26T16:49:27Z","timestamp":1343321367000},"page":"231-256","source":"Crossref","is-referenced-by-count":8,"title":["On Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate Cryptography"],"prefix":"10.1007","author":[{"given":"Vasyl","family":"Ustimenko","sequence":"first","affiliation":[]},{"given":"Urszula","family":"Roma\u0144czuk","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1007\/3-540-46416-6_49","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"E. Biham","year":"1991","unstructured":"Biham, E.: Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT 1991. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 532\u2013534. Springer, Heidelberg (1991)"},{"key":"10_CR2","first-page":"81","volume":"2","author":"I. Boudeliouua","year":"2011","unstructured":"Boudeliouua, I., Al Raissi, M., Touzene, A., Ustimenko, V.: Performance of Algebraic Graphs Based Stream-Ciphers Using Large Finite Fields. Annalles UMCS Informatica AI X1\u00a02, 81\u201393 (2011)","journal-title":"Annalles UMCS Informatica AI X1"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/3-540-45353-9_20","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"N.T. Courtois","year":"2001","unstructured":"Courtois, N.T.: The Security of Hidden Field Equations (HFE). In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 266\u2013281. Springer, Heidelberg (2001)"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/3-540-45539-6_27","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"N.T. Courtois","year":"2000","unstructured":"Courtois, N.T., Klimov, A.B., Patarin, J., Shamir, A.: Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 392\u2013407. Springer, Heidelberg (2000)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Davis, M.: The Universal Computer: The Road from Leibniz to Turing (2011)","DOI":"10.1201\/b11441"},{"issue":"6","key":"10_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. on Info. Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. on Info. Theory"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-24632-9_22","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"J. Ding","year":"2004","unstructured":"Ding, J.: A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 305\u2013318. Springer, Heidelberg (2004)"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/11426639_20","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"P.-A. Fouque","year":"2005","unstructured":"Fouque, P.-A., Granboulan, L., Stern, J.: Differential Cryptanalysis for Multivariate Schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 341\u2013353. Springer, Heidelberg (2005)"},{"issue":"10","key":"10_CR9","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1109\/81.633874","volume":"44","author":"M. Hasler","year":"1997","unstructured":"Hasler, M., Maistrenko, Y.: An introduction to the synchronization of chaotic systems: coupled skew tent maps. IEEE Trans. Circuits and Systems -I\u00a044(10), 856\u2013866 (1997)","journal-title":"IEEE Trans. Circuits and Systems -I"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/3-540-46416-6_11","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"T. Habutsu","year":"1991","unstructured":"Habutsu, T., Nishio, Y., Sasase, I., Mori, S.: A Secret Key Cryptosystem by Iterating a Chaotic Map. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 127\u2013140. Springer, Heidelberg (1991)"},{"key":"10_CR11","unstructured":"Hodges, A., Hofstadter, D.: Alan Turing: The Enigma (2000)"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-44448-3_4","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"L. Goubin","year":"2000","unstructured":"Goubin, L., Courtois, N.T.: Cryptanalysis of the TTM Cryptosystem. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 44\u201357. Springer, Heidelberg (2000)"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-45146-4_3","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J.-C. Faug\u00e8re","year":"2003","unstructured":"Faug\u00e8re, J.-C., Joux, A.: Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gr\u00f6bner Bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 44\u201360. Springer, Heidelberg (2003)"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-540-71677-8_16","volume-title":"Public Key Cryptography \u2013 PKC 2007","author":"J. Ding","year":"2007","unstructured":"Ding, J., Hu, L., Nie, X., Li, J., Wagner, J.: High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.\u00a04450, pp. 233\u2013248. Springer, Heidelberg (2007)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Ding, J., Gower, J.E., Schmidt, D.S.: Multivariate Public Key Cryptosystems. Springer (2006)","DOI":"10.1090\/conm\/419\/07997"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Kapitaniak, T.: Chaos for engineers, theory and applications, 142 p (2000)","DOI":"10.1007\/978-3-642-57143-5"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/3-540-48405-1_2","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"A. Kipnis","year":"1999","unstructured":"Kipnis, A., Shamir, A.: Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 19\u201330. Springer, Heidelberg (1999)"},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"127","DOI":"10.2478\/v10065-011-0007-6","volume":"2","author":"M. Klisowski","year":"2011","unstructured":"Klisowski, M., Roma\u0144czuk, U., Ustimenko, V.: On the implementation of cubic public keys based on new family of algebraic graphs. Annales UMCS Informatica AI XI\u00a02, 127\u2013141 (2011)","journal-title":"Annales UMCS Informatica AI XI"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Klisowski, M., Ustimenko, V.: On the implementation of cubic public keys based on algebraic graphs over the finite commutative ring and their symmetries. In: MACIS 2011: Fourth International Conference on Mathematical Aspects of Computer and Information Sciences, Beijing, p. 13 (2011)","DOI":"10.1109\/IMCSIT.2010.5679687"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Koblitz, N.: Algebraic aspects of cryptography. In: Algorithms and Computation in Mathematics, vol.\u00a03. Springer (1998)","DOI":"10.1007\/978-3-662-03642-6"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1142\/S0218127492000823","volume":"2","author":"L.J. Kocarev","year":"1992","unstructured":"Kocarev, L.J., Halle, K.S., Eckert, K., Chua, L.O., Parlitz, U.: Experimental demonstration of secure communications via chaos synchronization. Int. J. Bifurc. Chaos\u00a02, 709\u2013716 (1992)","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"2\/54","key":"10_CR22","doi-asserted-by":"crossref","first-page":"347","DOI":"10.5488\/CMP.11.2.347","volume":"11","author":"J.S. Kotorowicz","year":"2008","unstructured":"Kotorowicz, J.S., Ustimenko, V.: On the implementation of cryptoalgorithms based on algebraic graphs over some commutative rings. Condens. Matter Phys.\u00a011(2(54)), 347\u2013360 (2008)","journal-title":"Condens. Matter Phys."},{"key":"10_CR23","unstructured":"Kotorowicz, J.S., Ustimenko, V., Roma\u00faczk, U.: On the implementation of stream ciphers based on a new family of algebraic graphs. In: Proceedings of the Conference CANA, FedSCIS 2011, pp. 485\u2013490. IEEE Computer Society Press (2011)"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1002\/andp.19975090504","volume":"6","author":"Z. Kotulski","year":"1997","unstructured":"Kotulski, Z., Szczepaski, J.: Discrete chaotic cryptography. Annalen der Physik\u00a06, 381\u2013394 (1997)","journal-title":"Annalen der Physik"},{"key":"10_CR25","unstructured":"Kozaczuk, W.: Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War Two. University Publications of America (1984)"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Kruh, L.: Cipher Deavours. The Commercial Enigma: Beginnings of Machine Cryptography. Cryptologia\u00a026(1) (2002) (ang.)","DOI":"10.1080\/0161-110291890731"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Kymakya, K., Halang, W., Unger, H.: Recent Advances in Nonlinear Dynamics and Synchronization Theory, 398 p (2009)","DOI":"10.1007\/978-3-642-04227-0"},{"issue":"3","key":"10_CR28","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.jsc.2008.03.004","volume":"44","author":"D. Lazard","year":"2009","unstructured":"Lazard, D.: Thirty years of Polynomial System Solving, and now? J. Symb. Comput.\u00a044(3), 222\u2013231 (2009)","journal-title":"J. Symb. Comput."},{"key":"10_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/11605805_9","volume-title":"Topics in Cryptology \u2013 CT-RSA 2006","author":"L.-C. Wang","year":"2006","unstructured":"Wang, L.-C., Yang, B.-Y., Hu, Y.-H., Lai, F.: A \u201cMedium-Field\u201d Multivariate Public-Key Encryption Scheme. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol.\u00a03860, pp. 132\u2013149. Springer, Heidelberg (2006)"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Lavrov, R., Jacquot, M., Larger, L.: Nonlocal Nonlinear Electro-Optic Phase Dynamics Demonstrating 10 Gb\/s Chaos Communications. IEEE Journal of Quantum Electronics\u00a046(10) (October 2010)","DOI":"10.1109\/JQE.2010.2049987"},{"key":"10_CR31","doi-asserted-by":"publisher","first-page":"26207","DOI":"10.1103\/PhysRevE.80.026207","volume":"80","author":"R. Lavrov","year":"2009","unstructured":"Lavrov, R., Michael Peil, M., Jacquot, M., Larger, L., Udaltsov, V., Dudley, J.: Electro-optic delay oscillator with nonlocal nonlinearity: Optical phase dynamics, chaos, and synchronization. Physical Review E\u00a080, 026207 (2009)","journal-title":"Physical Review E"},{"key":"10_CR32","unstructured":"Magnus, W., Karras, A., Solita\u030br, D.: Combinatorial Group Theory. Interscience Publishers, New York (1966)"},{"key":"10_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/3-540-45961-8_39","volume-title":"Advances in Cryptology - EUROCRYPT \u201988","author":"T. Matsumoto","year":"1988","unstructured":"Matsumoto, T., Imai, H.: Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption. In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, pp. 419\u2013453. Springer, Heidelberg (1988)"},{"issue":"5","key":"10_CR34","doi-asserted-by":"publisher","first-page":"2207","DOI":"10.1080\/00927879908826559","volume":"27","author":"T. Moh","year":"1999","unstructured":"Moh, T.: A public key system with signature and master key functions. Commun. Algebra\u00a027(5), 2207\u20132222 (1999)","journal-title":"Commun. Algebra"},{"key":"10_CR35","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1142\/S0218127492000562","volume":"2","author":"U. Parlitz","year":"1992","unstructured":"Parlitz, U., Chua, L.O., Kocarev, L.J., Halle, K.S., Shang, A.: Transmission of digital signals by chaotic synchronization. Int. J. Bifurc. Chaos\u00a02, 973\u2013977 (1992)","journal-title":"Int. J. Bifurc. Chaos"},{"key":"10_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/3-540-44750-4_20","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"J. Patarin","year":"1995","unstructured":"Patarin, J.: Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt \u201988. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 248\u2013261. Springer, Heidelberg (1995)"},{"key":"10_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/3-540-68339-9_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"J. Patarin","year":"1996","unstructured":"Patarin, J.: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 33\u201348. Springer, Heidelberg (1996)"},{"key":"10_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/3-540-68697-5_4","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"J. Patarin","year":"1996","unstructured":"Patarin, J.: Asymmetric Cryptography With a Hidden Monomial. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 45\u201360. Springer, Heidelberg (1996)"},{"key":"10_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/3-540-45353-9_22","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"J. Patarin","year":"2001","unstructured":"Patarin, J., Courtois, N.T., Goubin, L.: FLASH, a Fast Multivariate Signature Algorithm. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 298\u2013307. Springer, Heidelberg (2001)"},{"key":"10_CR40","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1103\/PhysRevLett.64.821","volume":"64","author":"L.M. Pecora","year":"1990","unstructured":"Pecora, L.M., Caroll, T.L.: Synchronization in chaotic systems. Phys. Rev. Lett.\u00a064, 821\u2013824 (1990)","journal-title":"Phys. Rev. Lett."},{"key":"10_CR41","unstructured":"Rajesh, P., Singh, B., Sarma, K., Saiki, A.: Public key cryptography using. Permutation P-Polynomials over Finite Fields IACR Cryptology ePrint Archive 2009, p. 208 (2009)"},{"key":"10_CR42","doi-asserted-by":"publisher","first-page":"11","DOI":"10.2478\/v10065-011-0038-z","volume":"4","author":"U. Roma\u0144uczk","year":"2011","unstructured":"Roma\u0144uczk, U., Ustimenko, V.: On the key exchange with new cubical maps based on graphs. Annales UMCS Informatica AI XI\u00a04, 11\u201319 (2011)","journal-title":"Annales UMCS Informatica AI XI"},{"issue":"4","key":"10_CR43","first-page":"203","volume":"4","author":"U. Roma\u0144uczk","year":"2010","unstructured":"Roma\u0144uczk, U., Ustimenko, V.: On the key exchange with matrices of large order and graph based nonlinear maps. Albanian Journal of Mathematics, Special Issue, Application of Computer Algebra\u00a04(4), 203\u2013211 (2010)","journal-title":"Albanian Journal of Mathematics, Special Issue, Application of Computer Algebra"},{"key":"10_CR44","doi-asserted-by":"crossref","unstructured":"Shaska, T., Huffman, W.C., Joener, D., Ustimenko, V. (eds.): Series on Coding Theory and Cryptology, vol.\u00a03, pp. 181\u2013199. World Scientific (2007)","DOI":"10.1142\/6464"},{"issue":"7","key":"10_CR45","doi-asserted-by":"publisher","first-page":"1826","DOI":"10.1016\/j.laa.2008.08.023","volume":"430","author":"T. Shaska","year":"2009","unstructured":"Shaska, T., Ustimenko, V.: On the homogeneous algebraic graphs of large girth and their applications. Linear Algebra Appl.\u00a0430(7), 1826\u20131837 (2009); special Issue in Honor of Thomas J. Laffey","journal-title":"Linear Algebra Appl."},{"key":"10_CR46","first-page":"125","volume-title":"The \u201dVoronoj\u2019s Impact on Modern Science\u201d","author":"V. Ustimenko","year":"1998","unstructured":"Ustimenko, V.: Coordinatisation of Trees and their Quotients. In: The \u201dVoronoj\u2019s Impact on Modern Science\u201d, vol.\u00a02, pp. 125\u2013152. Institute of Mathematics, Kiev (1998)"},{"key":"10_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/3-540-45624-4_29","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"V. Ustimenko","year":"2001","unstructured":"Ustimenko, V.: CRYPTIM: Graphs as Tools for Symmetric Encryption. In: Bozta, S., Sphparlinski, I. (eds.) AAECC 2001. LNCS, vol.\u00a02227, pp. 278\u2013286. Springer, Heidelberg (2001)"},{"issue":"3","key":"10_CR48","first-page":"412","volume":"140","author":"V. Ustimenko","year":"2007","unstructured":"Ustimenko, V.: Linguistic Dynamical Systems, Graphs of Large Girth and Cryptography. Journal of Mathematical Sciences, Springer, vol\u00a0140(3), 412\u2013434 (2007)","journal-title":"Journal of Mathematical Sciences, Springer, vol"},{"key":"10_CR49","first-page":"51","volume":"10","author":"V. Ustimenko","year":"2004","unstructured":"Ustimenko, V.: Maximality of affine group and hidden graph cryptosystems. J. Algebra Discrete Math.\u00a010, 51\u201365 (2004)","journal-title":"J. Algebra Discrete Math."},{"key":"10_CR50","doi-asserted-by":"crossref","unstructured":"Ustimenko, V.: On the extremal graph theory for directed graphs and its cryptographical applications. In: Shaska, T., Huffman, W.C., Joener, D., Ustimenko, V. (eds.) Advances in Coding Theory and Cryptography. Series on Coding and Cryptology, vol.\u00a03, pp. 181\u2013200 (2007)","DOI":"10.1142\/9789812772022_0012"},{"key":"10_CR51","doi-asserted-by":"crossref","unstructured":"Ustimenko, V.: On the extremal regular directed graphs without commutative diagrams and their applications in coding theory and cryptography. Albanian J. Math.\u00a01(4) (2007); special issue on algebra and computational algebraic geometry","DOI":"10.51286\/albjm\/1199265923"},{"key":"10_CR52","doi-asserted-by":"crossref","unstructured":"Ustimenko, V.: On the cryptographical properties of extreme algebraic graphs. In: Shaska, T., Hasimaj, E. (eds.) Algebraic Aspects of Digital Communications, NATO Science for Peace and Security Series - D: Information and Communication Security, vol.\u00a024, pp. 256\u2013281. IOS Press (July 2009)","DOI":"10.3233\/978-1-60750-019-3-256"},{"key":"10_CR53","unstructured":"Ustimenko, V.: On the K-theory of graph based dynamical systems and its applications. Dopovidi of the National Ukrainian Academy of Sci. (to appear)"},{"key":"10_CR54","unstructured":"Ustimenko, V.: On Extremal Graph Theory and Symbolic Computations. Dopovidi of the National Ukrainian Acad. Sci. (to appear)"},{"key":"#cr-split#-10_CR55.1","unstructured":"Ustimenko, V.: On optimization problems for graphs and security of digital communications. In: International Conference Discrete Mathematics, Algebra and their Applications, October 19-22 (2009)"},{"key":"#cr-split#-10_CR55.2","unstructured":"Proceedings of the Institute of Mathematics, Belarussian Acad. Sci. (3), 12 (2010)"},{"key":"10_CR56","unstructured":"Ustimenko, V.: Algebraic graphs and security of digital communications. Institute of Computer Science. University of Maria Curie Sklodowska in Lublin, 151 p (2011); supported by European Social Foundation, available at the UMCS web"},{"key":"10_CR57","unstructured":"Ustimenko, V., Kotorowicz, J.S.: On the properties of stream ciphers based on extremal directed graphs. In: Chen, R.E. (ed.) Cryptography Research Perspective, pp. 125\u2013141. Nova Science Publishers (April 2009)"},{"key":"10_CR58","doi-asserted-by":"crossref","unstructured":"Ustimenko, V., Wr\u00f3blewska, A.: On the key exchange with nonlinear polynomial maps of degree 4. Albanian Journal of Mathematics, Special Issue, Applications of Computer Algebra\u00a04(4) (December 2010)","DOI":"10.51286\/albjm\/1292431792"},{"key":"10_CR59","doi-asserted-by":"publisher","first-page":"95","DOI":"10.2478\/v10065-011-0014-7","volume":"2","author":"V. Ustimenko","year":"2011","unstructured":"Ustimenko, V., Wr\u00f3blewska, A.: On the key expansion of D(n;K)-based cryptographical algorithm. Annales UMCS Informatica AI XI\u00a02, 95\u2013111 (2011)","journal-title":"Annales UMCS Informatica AI XI"},{"key":"10_CR60","unstructured":"Ustimenko, V., Wr\u00f3blewska, A.: On the key exchange with nonlinear polynomial maps of stable degree (to apear)"},{"key":"10_CR61","doi-asserted-by":"crossref","first-page":"229","DOI":"10.51286\/albjm\/1229509644","volume":"2","author":"A. Wr\u00f3blewska","year":"2008","unstructured":"Wr\u00f3blewska, A.: On some applications of graph based public key. Albanian J. Math.\u00a02, 229\u2013234 (2008); Proceedings of the NATO Advanced Studies Institute: \u201dNew challenges in digital communications\u201d","journal-title":"Albanian J. Math."}],"container-title":["Studies in Computational Intelligence","Artificial Intelligence, Evolutionary Computing and Metaheuristics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29694-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T14:30:40Z","timestamp":1743863440000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-29694-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642296932","9783642296949"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29694-9_10","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2013]]}}}