{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T11:11:43Z","timestamp":1714216303148},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Math.Comput.Sci."],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1007\/s11786-012-0115-8","type":"journal-article","created":{"date-parts":[[2012,7,21]],"date-time":"2012-07-21T14:05:00Z","timestamp":1342879500000},"page":"167-180","source":"Crossref","is-referenced-by-count":0,"title":["On Families of Graphs of Large Cycle Indicator, Matrices of Large Order and Key Exchange Protocols With Nonlinear Polynomial Maps of Small Degree"],"prefix":"10.1007","volume":"6","author":[{"given":"Urszula","family":"Roma\u0144czuk","sequence":"first","affiliation":[]},{"given":"Vasyl","family":"Ustimenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,22]]},"reference":[{"key":"115_CR1","unstructured":"Bollob\u00e1s, B.: Extremal Graph Theory. Academic Press, London (1982)"},{"key":"115_CR2","unstructured":"Carter, R.W.: Simple Groups of Lie Type. Wiley, New York (1972)"},{"key":"115_CR3","doi-asserted-by":"crossref","unstructured":"Koblitz, N.: A Course in Number Theory and Cryptography, 2nd edn. Springer, Berlin (1994)","DOI":"10.1007\/978-1-4419-8592-7"},{"key":"115_CR4","doi-asserted-by":"crossref","unstructured":"Koblitz, N.: Algebraic Aspects of Cryptography. Springer, Berlin (1998)","DOI":"10.1007\/978-3-662-03642-6"},{"key":"115_CR5","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1023\/B:DESI.0000029214.50635.17","volume":"32","author":"A. Cossidente","year":"2004","unstructured":"Cossidente A., de Ressmine M.J.: Remarks on singer cycle groups and their normalizers. Des. Codes Cryptogr. 32, 97\u2013102 (2004)","journal-title":"Des. Codes Cryptogr."},{"issue":"N2","key":"115_CR6","first-page":"62","volume":"115","author":"A. Lubotzky","year":"1989","unstructured":"Lubotzky A., Philips R., Sarnak P.: Ramanujan graphs. J. Comb. Theory. 115(N2), 62\u201389 (1989)","journal-title":"J. Comb. Theory."},{"issue":"1","key":"115_CR7","first-page":"3946","volume":"24","author":"G. Margulis","year":"1988","unstructured":"Margulis G.: Explicit group-theoretical constructions of combinatorial schemes and their application to the design of expanders and concentrators. J. Probl. Inf. Transm. 24(1), 3946 (1988)","journal-title":"J. Probl. Inf. Transm."},{"issue":"N3","key":"115_CR8","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1112\/jlms\/s2-15.3.445","volume":"15","author":"B. Mortimer","year":"1972","unstructured":"Mortimer B.: Permutation groups containing affine transformations of the same degree. J. Lond. Math. Soc. 15(N3), 445\u2013455 (1972)","journal-title":"J. Lond. Math. Soc."},{"key":"115_CR9","doi-asserted-by":"crossref","first-page":"264","DOI":"10.2307\/2369797","volume":"18","author":"E.H. Moore","year":"1886","unstructured":"Moore E.H.: Tactical memoranda. Am. J. Math. 18, 264\u2013303 (1886)","journal-title":"Am. J. Math."},{"key":"115_CR10","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/BF02684706","volume":"2","author":"J. Tits","year":"1959","unstructured":"Tits J.: Sur la trialite at certains groupes qui s\u2019en deduicent. Publ. Math. IHES 2, 15\u201320 (1959)","journal-title":"Publ. Math. IHES"},{"key":"115_CR11","unstructured":"Tits, J.: Buildings of spherical type and finite BN-pairs. In: Lecture Notes in Mathematics. Springer, Berlin (1974)"},{"key":"115_CR12","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1023\/A:1005919327201","volume":"52","author":"V.A. Ustimenko","year":"1998","unstructured":"Ustimenko V.A.: On the varieties of parabolic subgroups, their generalizations and combinatorial applications. Acta Appl. Math. 52, 223\u2013238 (1998)","journal-title":"Acta Appl. Math."},{"issue":"N2","key":"115_CR13","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1023\/A:1020686216463","volume":"71","author":"V.A. Ustimenko","year":"2002","unstructured":"Ustimenko V.A.: Graphs with special arcs and cryptography. Acta Appl. Math. 71(N2), 117\u2013153 (2002)","journal-title":"Acta Appl. Math."},{"key":"115_CR14","first-page":"51","volume":"10","author":"V.A. Ustimenko","year":"2004","unstructured":"Ustimenko V.A.: Maximality of affine group, and hidden graph cryptosystems. J. Algebra Discret. Math. 10, 51\u201365 (2004)","journal-title":"J. Algebra Discret. Math."},{"key":"115_CR15","doi-asserted-by":"crossref","unstructured":"Ustimenko, V.: CRYPTIM: graphs as tools for symmetric encryption. In: Lecture Notes in Computer Science, vol. 2227, pp. 278\u2013287. Springer, Berlin (2010)","DOI":"10.1007\/3-540-45624-4_29"},{"key":"115_CR16","doi-asserted-by":"crossref","unstructured":"Ustimenko, V.: On the extremal graph theory for directed graphs and its cryptographical applications. In: Shaska, T., Huffman, W.C., Joener, D., Ustimenko, V. (eds) Advances in Coding Theory and Cryptography, Series on Coding and Cryptology, vol. 3, pp. 181\u2013200 (2007)","DOI":"10.1142\/9789812772022_0012"},{"issue":"N3","key":"115_CR17","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1007\/s10958-007-0453-2","volume":"140","author":"V.A. Ustimenko","year":"2007","unstructured":"Ustimenko V.A.: Linguistic dynamical systems, graphs of large girth and cryptography. J. Math. Sci. 140(N3), 412\u2013434 (2007)","journal-title":"J. Math. Sci."},{"key":"115_CR18","unstructured":"Ustimenko, V.A., Wroblewska, A.: On the key exchange with nonlinear polynomial maps of degree 4. Albanian J. Math. 4(4), 161\u2013170 (2010)"},{"issue":"3","key":"115_CR19","doi-asserted-by":"crossref","first-page":"229","DOI":"10.51286\/albjm\/1229509644","volume":"2","author":"A. Wroblewska","year":"2008","unstructured":"Wroblewska A.: On some properties of graph based public keys. Albanian J. Math. 2(3), 229\u2013234 (2008)","journal-title":"Albanian J. Math."},{"key":"115_CR20","unstructured":"Ustimenko, V.: On extremal graph theory and symbolic computations. Dopovidi Ukr. Acad. Sci. (in press)"},{"issue":"1","key":"115_CR21","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1090\/S0273-0979-1995-00569-0","volume":"32","author":"F. Lazebnik","year":"1995","unstructured":"Lazebnik F., Ustimenko V.A., Woldar A.J.: A new series of dense graphs of high girth. Bull. Am. Math. Soc. (N.S.) 32(1), 73\u201379 (1995)","journal-title":"Bull. Am. Math. Soc. (N.S.)"},{"key":"115_CR22","unstructured":"Kotorowicz, J.S., Ustimenko, V., Roma\u0144czuk, U.: On the implementation of stream ciphers based on a new family of algebraic graphs. In: Computer Science and Information System (FedCIC 2011), Proceedings in the Federation Conference on, IEEE Xplore Digital Library, pp. 485\u2013490 (2011)"},{"issue":"2","key":"115_CR23","doi-asserted-by":"crossref","first-page":"127","DOI":"10.2478\/v10065-011-0007-6","volume":"AI XI","author":"M. Klisowski","year":"2011","unstructured":"Klisowski M., Roma\u0144czuk U., Ustimenko V.: On the implementation of cubic public keys based on new family of algebraic graphs. Ann. UMCS Inform. AI XI(2), 127\u2013141 (2011)","journal-title":"Ann. UMCS Inform."},{"key":"115_CR24","first-page":"299","volume":"390","author":"A.L. Chistov","year":"2011","unstructured":"Chistov A.L.: An improvement of the complexity bound for solving systems of polynomial equations. Zapisky Nauchnych Seminarov POMI 390, 299\u2013306 (2011)","journal-title":"Zapisky Nauchnych Seminarov POMI"},{"key":"115_CR25","doi-asserted-by":"crossref","unstructured":"Ustimenko, V., Roma\u0144czuk, U.: On dynamical systems of large girth o r cycle indicator and their applications to multivariate cryptography. In: \u201cArtificial Intelligence, Evolutionary Computing and Metaheuristics\u201d, in the footsteps of Alan Turing Series: Studies in Computational Intelligence, vol. 427, Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-29694-9_10"},{"key":"115_CR26","doi-asserted-by":"crossref","unstructured":"Ustimenko, V., Roma\u0144czuk, U.: On extremal graph theory, explicit algebraic constructions of extremal graphs and corresponding turing encryption machines. In: \u201cArtificial Intelligence, Evolutionary Computing and Metaheuristics\u201d, in the footsteps of Alan Turing Series: Studies in Computational Intelligence, vol. 427. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-29694-9_11"},{"key":"115_CR27","volume-title":"Graph theory","author":"R. Ore","year":"1971","unstructured":"Ore R.: Graph theory. Wiley, London (1971)"},{"issue":"2","key":"115_CR28","first-page":"127","volume":"AI XI","author":"M. Klisowski","year":"2011","unstructured":"Klisowski M., Roma\u0144czuk U., Ustimenko V.: The implementations of cubic public keys based on a new family of algebraic graphs. Ann. UMCS Inform. AI XI(2), 127\u2013141 (2011)","journal-title":"Ann. UMCS Inform."}],"container-title":["Mathematics in Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11786-012-0115-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11786-012-0115-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11786-012-0115-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T10:30:10Z","timestamp":1714213810000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11786-012-0115-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["115"],"URL":"https:\/\/doi.org\/10.1007\/s11786-012-0115-8","relation":{},"ISSN":["1661-8270","1661-8289"],"issn-type":[{"value":"1661-8270","type":"print"},{"value":"1661-8289","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,6]]}}}