{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T08:40:02Z","timestamp":1746348002133,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662448922"},{"type":"electronic","value":"9783662448939"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44893-9_3","type":"book-chapter","created":{"date-parts":[[2014,8,20]],"date-time":"2014-08-20T03:15:08Z","timestamp":1408504508000},"page":"23-37","source":"Crossref","is-referenced-by-count":0,"title":["On Multivariate Cryptosystems Based on Polynomially Compressed Maps with Invertible Decomposition"],"prefix":"10.1007","author":[{"given":"Urszula","family":"Roma\u0144czuk-Polubiec","sequence":"first","affiliation":[]},{"given":"Vasyl","family":"Ustimenko","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","volume-title":"Extremal Graph Theory","author":"B. Bollob\u00e1s","year":"1978","unstructured":"Bollob\u00e1s, B.: Extremal Graph Theory. Academic Press, London (1978)"},{"unstructured":"Ding, J., Gower, J.E., Schmidt, D.S.: Multivariate Public Key Cryptosystems. Advances in Information Security, vol.\u00a025, p. 260. Springer (2006)","key":"3_CR2"},{"doi-asserted-by":"crossref","unstructured":"Ding, J., Yang, B.-Y.: Multivariate Public-Key Cryptography. In: Post-Quantum Cryptography, pp. 193\u2013241. Springer (2009)","key":"3_CR3","DOI":"10.1007\/978-3-540-88702-7_6"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/3-540-16776-5_713","volume-title":"Algebraic Algorithms and Error-Correcting Codes","author":"H. Imai","year":"1986","unstructured":"Imai, H., Matsumoto, T.: Algebraic methods for constructing asymmetric cryptosystems. In: Calmet, J. (ed.) AAECC 1985. LNCS, vol.\u00a0229, pp. 108\u2013119. Springer, Heidelberg (1986)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/BFb0055733","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"A. Kipnis","year":"1998","unstructured":"Kipnis, A., Shamir, A.: Cryptanalysis of the oil & vinegar signature scheme. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 257\u2013266. Springer, Heidelberg (1998)"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s11786-012-0121-x","volume":"2","author":"M. Klisowski","year":"2012","unstructured":"Klisowski, M., Ustimenko, V.: On the Comparison of Cryptographical Properties of Two Different Families of Graphs with Large Cycle Indicator. Mathematics in Computer Science\u00a02, 181\u2013198 (2012)","journal-title":"Mathematics in Computer Science"},{"doi-asserted-by":"crossref","unstructured":"Kotorowicz, J., Ustimenko, V.: On the implementation of cryptoalgorithms based on algebraic graphs over some commutative rings. Special Issue: Proceedings of the International Conferences: Infinite Particle Systems, Complex Systems Theory and its Application, Kazimerz Dolny, Poland (2006), Condenced Matters Physics 11(2(54)), 347\u2013360 (2008)","key":"3_CR7","DOI":"10.5488\/CMP.11.2.347"},{"key":"3_CR8","first-page":"62","volume":"115","author":"A. Lubotsky","year":"1989","unstructured":"Lubotsky, A., Philips, R., Sarnak, P.: Ramanujan graphs. J. Comb. Theory\u00a0115, 62\u201389 (1989)","journal-title":"J. Comb. Theory"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1090\/S0273-0979-1995-00569-0","volume":"32","author":"F. Lazebnik","year":"1995","unstructured":"Lazebnik, F., Ustimenko, V., Woldar, A.J.: A New Series of Dense Graphs of High Girth. J.Bull. Amer. Math. Soc.\u00a032, 73\u201379 (1995)","journal-title":"J.Bull. Amer. Math. Soc."},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/0166-218X(94)00058-L","volume":"60","author":"F. Lazebnik","year":"1995","unstructured":"Lazebnik, F., Ustimenko, V.: Explicit construction of graphs with arbitrary large girth and of large size. Discrete Applied Mathematics\u00a060, 275\u2013284 (1995)","journal-title":"Discrete Applied Mathematics"},{"issue":"1","key":"3_CR11","first-page":"51","volume":"24","author":"G. Margulis","year":"1988","unstructured":"Margulis, G.: Explicit group-theoretical constructions of combinatorial schemes and their application to desighn of expanders and concentrators. J. Probl. Peredachi Informatsii.\u00a024(1), 51\u201360 (1988); English translation publ. Journal of Problems of Information Transmission, 39\u201346","journal-title":"J. Probl. Peredachi Informatsii."},{"unstructured":"Roma\u0144czuk, U., Ustimenko, V.: On regular forests given in terms of algebraic geometry, new families of expanding graphs with large girth and new multivariate cryptographical algorithms. In: Proceedings of International Conference: Applications of Computer Algebra, Malaga, 135\u2013139 (2013)","key":"3_CR12"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-48329-2_1","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"A. Shamir","year":"1994","unstructured":"Shamir, A.: Efficient signature schemes based on birational permutations. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 1\u201312. Springer, Heidelberg (1994)"},{"unstructured":"Ustimenko, V.: Coordinatisation of Trees and their Quotients. In: The \u201cVoronoj\u2019s Impact on Modern Science\u201d. Kiev, Institute of Mathematics, vol.\u00a02, pp. 125\u2013152 (1998)","key":"3_CR14"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/3-540-45624-4_29","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"V. Ustimenko","year":"2001","unstructured":"Ustimenko, V.: CRYPTIM: Graphs as Tools for Symmetric Encryption. In: Bozta, S., Sphparlinski, I. (eds.) AAECC 2001. LNCS, vol.\u00a02227, pp. 278\u2013287. Springer, Heidelberg (2001)"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1023\/A:1020686216463","volume":"74","author":"V. Ustimenko","year":"2002","unstructured":"Ustimenko, V.: Graphs with special arcs and cryptography. Acta Applicandae Mathematicae (Kluwer)\u00a074, 117\u2013153 (2002)","journal-title":"Acta Applicandae Mathematicae (Kluwer)"},{"key":"3_CR17","first-page":"133","volume":"1","author":"V. Ustimenko","year":"2005","unstructured":"Ustimenko, V.: Maximality of affine group and hidden graph cryptosystems. J. Algebra Discrete Math. (1), 133\u2013150 (2005)","journal-title":"J. Algebra Discrete Math."},{"doi-asserted-by":"crossref","unstructured":"Ustimenko, V.: On the cryptographical properties of extreme algebraic graphs. In: Algebraic Aspects of Digital Communications. Lectures of Advanced NATO Institute, NATO Science for Peace and Security Series - D: Information and Communication Security, vol.\u00a024, p. 296. IOS Press (2009)","key":"3_CR18","DOI":"10.3233\/978-1-60750-019-3-256"},{"doi-asserted-by":"crossref","unstructured":"Ustimenko, V.: On the extremal graph theory for directed graphs and its cryptographical applications. In: Shaska, T., Huffman, W.C., Joener, D., Ustimenko, V. (eds.) Advances in Coding Theory and Cryptography, Series on Coding and Cryptology, vol.\u00a03, pp. 181\u2013200 (2007)","key":"3_CR19","DOI":"10.1142\/9789812772022_0012"},{"key":"3_CR20","doi-asserted-by":"crossref","first-page":"25","DOI":"10.51286\/albjm\/1236885681","volume":"3","author":"V. Ustimenko","year":"2009","unstructured":"Ustimenko, V.: Algebraic groups an small world graphs of high girth. Albanian Journal of Mathematics\u00a03, 25\u201333 (2009)","journal-title":"Albanian Journal of Mathematics"},{"key":"3_CR21","series-title":"SCI","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-29694-9_10","volume-title":"Artificial Intelligence, Evolutionary Computing and Metaheuristics","author":"V. Ustimenko","year":"2013","unstructured":"Ustimenko, V., Roma\u0144czuk, U.: On Dynamical Systems of Large Girth or Cycle Indicator and their applications to Multivariate Cryptography. In: Yang, X.-S. (ed.) Artificial Intelligence, Evolutionary Computing and Metaheuristics. SCI, vol.\u00a0427, pp. 231\u2013256. Springer, Heidelberg (2013)"},{"unstructured":"Ustimenko, V.: Wr\u00f3blewska, A.: On some algebraic aspects of data security in cloud computing. In: Proceedings of International Conference: Applications of Computer Algebra, Malaga, pp. 144\u2013147 (2013)","key":"3_CR22"},{"doi-asserted-by":"crossref","unstructured":"Ustimenko V., Wr\u00f3blewska, A.: On the key exchange encryption with nonlinear multivariate maps of stable degree. Annales UMCS (Informatica) (accepted for publication, 2014)","key":"3_CR23","DOI":"10.2478\/v10065-012-0047-6"},{"issue":"3","key":"3_CR24","doi-asserted-by":"crossref","first-page":"229","DOI":"10.51286\/albjm\/1229509644","volume":"2","author":"A. Wr\u00f3blewska","year":"2008","unstructured":"Wr\u00f3blewska, A.: On some properties of graph based public keys. NATO Advanced Studies Institute: New challenges in digital communications. Albanian Journal of Mathematics\u00a02(3), 229\u2013234 (2008)","journal-title":"Albanian Journal of Mathematics"}],"container-title":["Communications in Computer and Information Science","Cryptography and Security Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44893-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T08:27:15Z","timestamp":1746347235000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44893-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662448922","9783662448939"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44893-9_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}