{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T19:40:13Z","timestamp":1713382813285},"reference-count":23,"publisher":"Maria Curie-Sklodowska University","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1,1]]},"DOI":"10.2478\/v10065-011-0014-7","type":"journal-article","created":{"date-parts":[[2012,1,14]],"date-time":"2012-01-14T19:52:38Z","timestamp":1326570758000},"source":"Crossref","is-referenced-by-count":2,"title":["On the key expansion of D(n, K)-based cryptographical algorithm"],"prefix":"10.17951","volume":"11","author":[{"given":"Vasyl","family":"Ustimenko","sequence":"first","affiliation":[]},{"given":"Aneta","family":"Wr\u00f3blewska","sequence":"additional","affiliation":[]}],"member":"7349","reference":[{"key":"1","first-page":"278","volume-title":"Lecture Notes in Computer Science","volume":"2227","author":"V. Ustimenko","year":"2001"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.55630\/sjc.2007.1.131-156","article-title":"On the graph based cryptography and symbolic computations","author":"V. Ustimenko","year":"2007"},{"key":"3","article-title":"On the key exchange with nonlinear polynomial maps of stable degree","author":"V. Ustimenko","journal-title":"Fundamenta Informaticae"},{"key":"4","first-page":"296","volume-title":"Algebraic Aspects of Digital Communications, NATO Science for Peace and Security Series - D: Information and Communication Security","volume":"24","author":"V. Ustimenko","year":"2009"},{"issue":"3","key":"5","doi-asserted-by":"crossref","first-page":"229","DOI":"10.51286\/albjm\/1229509644","article-title":"On some properties of graph based public keys","volume":"2","author":"A. Wroblewska","year":"2008","journal-title":"Albanian Journal of Mathematics"},{"key":"6","volume-title":"Extremal Graph Theory","author":"B. Bollob\u00e1s","year":"1978"},{"key":"7","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/BF02579283","article-title":"Explicit construction of graphs without short cycles and low density codes","volume":"2","author":"G. Margulis","year":"1982","journal-title":"Combinatorica"},{"issue":"2","key":"8","first-page":"62","article-title":"Ramanujan graphs","volume":"115","author":"A. Lubotsky","year":"1989","journal-title":"J. Comb. Theory."},{"key":"9","first-page":"5","article-title":"Tanner Type Codes Arising from Large Girth Graphs","author":"P. Guinand","year":"1997"},{"key":"10","first-page":"111","article-title":"Graph Theoretic Construction of Generalized Product Codes","author":"P. Guinand","year":"1997"},{"issue":"10","key":"11","first-page":"2378","article-title":"Explicit construction of families of LDPC codes with no 4-cycles, Information Theory","volume":"50","author":"Kim Jon-Lark","year":"2004","journal-title":"IEEE Transactions"},{"key":"12","first-page":"228","volume-title":"Voronoi's impact on modern science","author":"V. Ustimenko","year":"1998"},{"issue":"2","key":"13","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1023\/A:1020686216463","article-title":"Graphs with Special Arcs and Cryptography","volume":"74","author":"V. Ustimenko","year":"2002","journal-title":"Acta Applicandae Mathematicae"},{"issue":"2","key":"14","doi-asserted-by":"crossref","first-page":"347","DOI":"10.5488\/CMP.11.2.347","article-title":"On the implementation of cryptoalgorithms based on algebraic graphs over some commutative rings","volume":"11","author":"S. Kotorowicz","year":"2008","journal-title":"Condensed Matter Physics"},{"key":"15","first-page":"51","article-title":"Maximality of affine group, and hidden graph cryptosystems","volume":"10","author":"V. Ustimenko","year":"2004","journal-title":"J. Algebra and Discrete Math."},{"issue":"3","key":"16","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1007\/s10958-007-0453-2","article-title":"Linguistic Dynamical Systems, Graphs of Large Girth and Cryptography","volume":"140","author":"V. Ustimenko","year":"2007","journal-title":"Journal of Mathematical Sciences"},{"key":"17","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1142\/9789812772022_0012","volume-title":"Advances in Coding Theory and Cryptography, Series on Coding and Cryptology 3","author":"V. Ustimenko","year":"2007"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1109\/IMCSIT.2010.5679687","article-title":"On the implementation of public keys algorithms based on algebraic graphs over finite commutative rings","author":"M. Klisowski","year":"2010"},{"issue":"4","key":"19","article-title":"On the key exchange with nonlinear polynomial maps of degree 4, Albanian Journal of Mathematics, Special Issue","volume":"4","author":"V. Ustimenko","year":"2010","journal-title":"Applications of Computer Algebra"},{"key":"20","first-page":"73","article-title":"Graphs with large girth","volume":"25C","author":"N. Biggs","year":"1988","journal-title":"Ars Combinatoria"},{"key":"21","doi-asserted-by":"crossref","first-page":"264","DOI":"10.2307\/2369797","article-title":"Tactical Memoranda","volume":"18","author":"E. Moore","year":"1886","journal-title":"Amer. J. Math."},{"key":"22","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/S0012-365X(96)83019-6","article-title":"A Characterization of the Components of the graphs <i>D<\/i>(<i>k, q<\/i>)","volume":"157","author":"F. Lazebnik","year":"1996","journal-title":"Discrete Mathematics"},{"key":"23","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/0166-218X(94)00058-L","article-title":"Explicit construction of graphs with an arbitrary large girth and of large size","volume":"60","author":"F. Lazebnik","year":"1995","journal-title":"Discrete Appl. Math."}],"container-title":["Annales UMCS, Informatica"],"original-title":[],"link":[{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/download\/3313\/2507","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T18:44:24Z","timestamp":1713379464000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/view\/3313"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,1]]},"references-count":23,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.2478\/v10065-011-0014-7","relation":{},"ISSN":["2083-3628","1732-1360"],"issn-type":[{"value":"2083-3628","type":"electronic"},{"value":"1732-1360","type":"print"}],"subject":[],"published":{"date-parts":[[2011,1,1]]}}}