Priyadarsini, P. L. K. A survey on some applications of graph theory in cryptography. (English) Zbl 1495.94067 J. Discrete Math. Sci. Cryptography 18, No. 3, 209-217 (2015). Cited in 3 Documents MSC: 94A60 Cryptography 05C48 Expander graphs Keywords:cryptographic algorithms; extremal graphs; expander graphs Software:CRYPTIM PDFBibTeX XMLCite \textit{P. L. K. Priyadarsini}, J. Discrete Math. Sci. Cryptography 18, No. 3, 209--217 (2015; Zbl 1495.94067) Full Text: DOI References: [1] Gideon, Samid, Denial Cryptography based on Graph Theory [2] Mittenthal, Lothrop; Golomb, S. W., Sequencings and Directed Graphs with Applications to Cryptography, 70-81, 2007, Springer-Varlag LNCS 4893 · Zbl 1154.94423 [3] Shamir, Adi, Commun, 22, 11, How to share a secret, 612-613 (1979), ACM · Zbl 0414.94021 [4] Naor, Moni; Shamir, Adi, In Advances in Cryptology - EURO-CRYPT’94, LNCS, 950, Visual cryptography, 1-12 (1994) · Zbl 0878.94048 [5] Steve, Lu; Daniel, Manchala; Ostrovsky, Rafail, Visual Cryptography on Graphs, COCOON 2008, 225-234 (2008) · Zbl 1148.94435 [6] In: Lecture Notes in Comput. Sci., 2227, Vasyl Ustimenko CRYPTIM: Graphs as tools for symmetric encryption (2001), Springer: Springer, New York [7] Vasiliy, A. Ustimenko, Graphs with Special Arcs and Cryptography, Acta Applicandae Mathematicae, 74, 2, 117-153 (2002) · Zbl 1065.68050 [8] Ustimenko, V. A., J. of Mathematical Sciences, 140-3, On Linguistic Dynamical Systems, Graphs of Large Girth and Cryptography, 412-434 (2007), Springer [9] Ustimenko, V. A., On Graph-Based Cryptography And Symbolic Computations, Serdica J. Computing, 131-156 (2007) · Zbl 1256.94067 [10] Kotorowicz_, J. S.; Ustimenko, V. A., On The Implementation Of Cryptoalgorithms Based On Algebraic Graphs Over Some Commutative Rings, Condensed Matter Physics, 11, 2-54, 347-360 (2008) [11] Ustimenko, Vasyl, On the hidden discrete logarithm for some polynomial stream ciphers, Proceedings Of The IMCSIT, 3, 297-301 (2008) [12] Ustimenko, Vasyl, On Extremal Graph Theory for Directed Graphs and its Applications to Information Security · Zbl 1363.94069 [13] Stallings, William, Cryptography and Network Security Principles and Practices (2006), Prentice Hall India [14] Song, Dawn; Zuckermany,_David; Tygar, J. D., Expander Graphs for Digital Stream Authentication and Robust Overlay Networks, Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P.02) (2002) [15] David, Jao; Stephen, D. Miller; Venkatesan, Ramarathnam, Expander graphs based on GRH with an application to elliptic curve cryptography · Zbl 1228.05167 [16] Charles, Denis X.; Lauter, Kristin E., Cryptographic Hash Functions from Expander Graphs, J. Cryptology, 22, 93-113 (2009) · Zbl 1166.94006 [17] Goldreich, Oded, Candidate One-Way Functions Based on Expander Graphs · Zbl 1306.94056 [18] petit, Christophe, Graph Based Cryptographic Hash Functions [19] Ustimenko, V.; Shaska, T.; Hu®man, W. C.; Joener, D.; Ustimenko, V., in Advances in Coding Theory and Cryptography- Series on Coding Theory and Cryptology, 3, On the Extremal Graph Theory for Directed Graphs and its Crypto-graphical Applications (2007) This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.