<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Cybersecurity Providing in Information and Telecommunication Systems, October</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>On Multivariate Maps of High Degree for the Post Quantum Protection of Virtual Organizations</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vasyl Ustimenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tymoteusz Chojecki</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Telecommunications and the Global Information Space of the National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>13 Chokolivsky boul., Kyiv, 02000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Royal Holloway University of London</institution>
          ,
          <addr-line>Egham Hill, Egham TW20 0EX</addr-line>
          ,
          <country country="UK">UK</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Marie Curie-Sklodowska in Lublin</institution>
          ,
          <addr-line>5 Plac Marii Curie-Skłodowskiej str., Lublin, 20-031</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2022</year>
      </pub-date>
      <volume>13</volume>
      <issue>2022</issue>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The intersection of Commutative and Multivariate cryptography contains studies of cryptographic applications of subsemigroups and subgroups of affine Cremona semigroups defined over finite commutative ring K with the unit. We consider two special families of subsemigroups in a semigroup of all endomorphisms of K[x1, x2, …, xn]. They can be used in Post Quantum Cryptography for the development of key exchange protocols of Noncommutative Cryptography with output presented as multivariale map of high degree and density. The security of these schemes is based on a complexity of Conjugacy Power Problem. Suggested schemes can be converted in protocol based cryptosystems of El Gamal type and used for post quantum protection of Virtual Organisations in Global Information Space. Algorithms are implemented in the cases of finite fields of characteristic 2 and arithmetic rings Zm, m=2n, n=8,16,32.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Multivariate transformations</kwd>
        <kwd>virtual organization</kwd>
        <kwd>knowledge base</kwd>
        <kwd>noncommutative cryptography</kwd>
        <kwd>multivariate cryptography</kwd>
        <kwd>graph based cryptography</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        NIST 2017 tender starts the standardisation
process of possible Post-Quantum Public keys
aimed for purposes to be:
 Encryption tools.
 Tools for digital signatures [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        In July 2020 the Third round of the
competition was started. In the category of
Multivariate Cryptography (MC) remaining
candidates are easy to observe [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        For the first task multivariate algorithm were
not selected, single multivariate candidate is
Rainbow Like Unbalanced Oil and Vinegar
(RUOV) In fact RUOV algorithm is investigated
as appropriate instrument for the second task
[
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Post Quantum, Multivariate and</title>
    </sec>
    <sec id="sec-3">
      <title>Noncommutative Cryptography and Virtual Organizations</title>
      <p>Noteworthy that all multivariate NIST
candidates were presented by multivariate rule of
degree bounded by constant (2 or 3) of kind
x1→f1(x1, x2, …, xn), x2→f2(x1, x2, …, xn), …,
xn→fn(x1, x2, …, xn).</p>
      <p>
        In fact RUOV is given by quadratic system of
polynomial equations. During Third Round of
NIST project [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] some crypto analytical
instruments for breaking ROUV were found. So,
all multivariate algorithms-candidates were
rejected during the project and first four winners
were announced in July, 2022. All of them are
within the area of Lattice based Cryptography.
      </p>
      <p>We think that these NIST outcomes motivate
investigations of alternating options in
Multivariate Cryptography oriented on encryption
tools and conducting digital signatures.</p>
      <p>(a) To work with plainspace Fqn and its
transformation G of linear degree cn, c &gt; 0 on the
level of stream ciphers or public keys.</p>
      <p>(b) To use protocols of Noncommutative
Cryptography with platforms of multivariate
transformations for the secure elaboration of
multivariate map G from End(Fq[x1, x2, …, xn]) of
linear or superlinear degree and density bounded
below by function of kind cnr, where c&gt;0 and r&gt;1.</p>
      <p>Recall that density is the number of all
monomial term in standard form xi → gi(x1, x2, …,
xn), i = 1,2,…,n of G, where polynomials g1 are
given via the lists of monomial terms in the
lexicographical order.</p>
      <p>Solution of task (b) can be used for the control
access to the portal B of virtual organisation
(knowledge base, virtual decision making centre,
etc.) via secure communications of portal
administrator (Alice) and public user (Bob).</p>
      <p>Assume that the information in B is presented
in binary alphabet. So we can identify characters
of this alphabet with elements of finite field Fq,
q=256. Portal has a search engine. So, we can
assume that the size of the information through the
portal is practically unlimited.</p>
      <p>Assume that some secure tools are used to
protect the entrance of B. To enter the system user
need a password which is a tuple E of length n
written in alphabet Fq. It has to be changed
regularly with the usage of certain period ∆.</p>
      <p>We suggest the following access control
scheme. Alice and Bob use several session of
Postquantum Secure Protocols of
Noncommutative Cryptography based on a
subsemigroup S of End Fq [x1, x2, …, xn] to
elaborate multivariate map G from S of kind
xi→fi(x1, x2, …, xn), i = 1,2,…,n of degree bounded
below by cn, c&gt;0 and density bounded below by
dnr where c, d are positive constants and r &gt; 2.</p>
      <p>The standard form of G can be unknown. This
map could be non bijective one. It has to be given
with a polynomial algorithm of computation the
value of G in given tuple P = (p1, p2, …, pn).</p>
      <p>Alice use some pseudorandom generator of
tuples for the creation of P = (p1, p2, …, pn) and
sends it to Bob via open channel. She enters
password E = G(p1, p2, …, pn) to secure the
portal.</p>
      <p>Bob also computes the tuple E and enters the
system. We can assume that data storage B
contains a pseudorandom (or genuinely random,
obtained via quantum computations) matrix of
rows Mi = (mi,1, mi,2, …, mi,n), i ϵ J for some
“potentially infinite” set J.</p>
      <p>So, Alice and Bob can periodically compute
G(Mi) and use this tuple as entrance password.</p>
      <p>Additionally they can use G for symmetric
communication via one time pad.</p>
      <p>Alice writes her plaintext P=(p1, p2, …, pn)
from Fqn. She computes P + G(Mi) and sends it to
Bob. He knows Mi as well. So, Bob restores the
plaintext.</p>
      <p>Surely instead of one time pad correspondents
can use other stream cipher with periodical
change of password.</p>
      <p>It is naturally to consider more general case of
arbitrarily commutative ring K instead of finite
field Fq. We will use Algebraic Graphs to generate
highly nonlinear automorphisms of K[x1, x2, …,
xn] over commutative ring.</p>
      <p>For creation of Mi, i ϵ J ontological
technologies can be used. We use files obtained
by ontological instruments presenting for example
key words of texts with the relations between
them in the form of graph (trees or other
diagrams). One can combine ontological
extraction with hashing technologies to make
digests of documents of appropriate size.</p>
      <p>We hope that this new application of
technologies for special ontological extractions
will motivate further research in this important
direction.</p>
      <p>The task is new because of postquantum
protocols with outputs in the form of highly
nonlinear map of affine map of K n to itself appear
very recently.</p>
      <p>We present one of them below.</p>
    </sec>
    <sec id="sec-4">
      <title>3. Multivariate Platforms of</title>
    </sec>
    <sec id="sec-5">
      <title>Noncommutative Cryptography and Their Applications</title>
      <p>Regular algebraic graph A(n, q) =A(n, Fq) is an
important object of Extremal Graph Theory. In
fact we can consider more general graphs A(n, K)
defined over arbitrary commutative ring K.</p>
      <p>This graph is a bipartite graph with the point
set P=Kn and line set L=Kn (two copies of a
Cartesian power of K are used). It is convenient to
use brackets and parenthesis to distinguish tuples
from P and L.</p>
      <p>So, (p) = (p1, p2, …, pn) ϵ Pn and [l] = [l1, l2, …,
ln] ϵ Ln. The incidence relation I = A(n,K) (or
corresponding bipartite graph I) can be given by
condition p I l if and only if the equations of the
following kind hold:
p2 – l2 = l1p1
p3 – l3 = p1l2,
p4 – l4 = l1p3,
p5 – l5 = p1l4, … ,
pn – ln = p1ln-1
for odd n and pn – ln = l1pn–1 for even n.</p>
      <p>They were intensively used for the
constructions of LDPC codes for satellite
communications and cryptographic algorithms.</p>
      <p>In the case of K=Fq, q &gt; 2 of odd characteristic
graphs A(n, Fq), n &gt; 1 form a family of small
world graphs because their diameter is bounded
by linear function in variable n. We can consider
an infinite bipartite graph A(K) with points (p1, p2,
…, pn, …) and lines [l1, l2, …,ln, …]. If K, |K| &gt; 2
is an integrity then A(K) is a tree and A(n, K),
n=2,3,… is its algebraic approximation of large
girth.</p>
      <p>We refer to the first coordinates p1=ῤ((p)) and
l1=ῤ([l]) as colors of vertices of A(K) (or A(n, K)).
It is easy to check that each vertex v of the graph
has a unique neighbor Na(v) of selected colour a.
So the walk of length 2k from vertex (0,0,…) will
be given by the sequence w of colours of its
elements b1, a1, b2, a2, …, bk, ak.</p>
      <p>It will be the walk without repetition of edges
if 0 ≠ a1, ai ≠ ai+1 and bi ≠ bi+1 for i=1, 2,…, k-1.
So we can identify walks from 0 point of even
length point with sequence of kind w. Let w’=(b’1,
a’1, b’2, a’2, …, b’s, a’s).We define the
composition u of w and w’ as the sequence u=(b1,
a1, b2, a2, …,bk, ak, b’1 + ak, ak + a’1, b’2 + ak, …,
b’s + ak, a’s + ak). If w and w’ are paths and
b’1 + ak ≠ bk then u is also a path.</p>
      <p>Let BP(K) be a semigroup of all walks with this
operation. One can identify empty string with the
unity of BP(K).We use term branching semigroup
for BP(K).
3.1.</p>
    </sec>
    <sec id="sec-6">
      <title>Group Family</title>
      <p>Let us take graph A(n, K) together with A(n,
K[x1, x2, …, xn]). For each element w from BP(K)
we consider a walk ∆(w) in A(n, K[x1, x2, …, xn])
with starting point (x1, x2, …, xn) where xi are
generic elements of K[x1, x2, …, xn] and special
colors of vertices x1 + b1, x1 + a1, …, x1 + bk,
x1 + ak. Let p’=dest(∆(w)) be a destination, i. e. a
final point of this walk. The destination has
coordinates (x1 + ak, f1(x1, x2), f2(x1, x2, x3), …,
fn1(x1, x2, …, xn) where f1 are elements of K[x1, x2,
…, xn]. We consider the transformation nή(w) of
P=K n defined bythe rule x1 → x1 + ak, x2→f1(x1,
x2), x3 → f2(x1, x2, x3), …, xn→ fn-1(x1 x2, …,
xn).This transformation is bijective map of Kn to
itself. It is an element of affine Cremona group
CG(Kn) of elements from Aut(K[x1, x2, …, xn])
acting naturally on Kn. The inverse for this map is
nή(w)-1 which coincides with nή(w’) for w’
=Rev(w)=(-at ,b1-at, a2-at, b2-at, …, bt-at).We refer
to Rev(w) as reverse string for w from BP(K).</p>
      <p>
        Proposition 2.1.1 [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The map nή from BP(K)
to CG(Kn) is a homomorphism of the semigroup
into group.
      </p>
      <p>We refer to nή as compression map and denote
nή(BP(K)) as GA(n, K). Degree of element g of
Cremona group CG(Kn) of kind xi→gi(x1, x2, …,
xn) is the maximal degree of polynomials gi.</p>
      <p>
        Theorem 2.1.1 [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The maximal degree of
multivariate element g from GA(n, K) equals 3.
      </p>
      <p>It means that subgroup G of kind TGA(n,K)T–1
where T is an element of AGLn(K) can be used
efficiently as a platform for the implementation of
protocols of Noncommutative Cryptography.
3.2.</p>
    </sec>
    <sec id="sec-7">
      <title>Semigroup Family</title>
      <p>Let K be a finite commutative ring with the
unit such that multiplicative group K* of regular
elements of the ring contains at least 2 elements.
We take Cartesian power nE(K) = (K*)n and
consider an Eulerian semigroup nES(K) of
transformations of kind
x1 → ϻ1x1 a(1,1)x2 a(1,2) … xm a(1,n),
x2 → ϻ2x1a(2,1)x2 a(2,2) … xn a(2,n), (1)
…
xn → ϻnx1 a(n,1) x2 a(n,2) … xn a(n,n),
where a(i,j) are elements of arithmetic ring Zd,
d=|K*|, ϻiϵK*.
3.3.</p>
    </sec>
    <sec id="sec-8">
      <title>Two Platforms in a Tandem</title>
      <p>Let nEG(K) stand for Eulerian group of
invertible transformations from nES(K). It is easy
to see that the group of monomial linear
transformations Mn is a subgroup of nEG(K). So
semigroup nES(K) is a highly noncommutative
algebraic system. Each element from nES(K) can
be considered as transformation of a free module
Kn.</p>
      <p>1. Twisted Diffie-Hellman protocol.</p>
      <p>Let S be an abstract semigroup which has
some invertible elements.</p>
      <p>Alice and Bob share element g ϵ S and pair of
invertible elements h, h–1 from this semigroup.</p>
      <p>Alice takes positive integer t = kA and d = rA
and forms h-dghd = gA. Bob takes s = kB and p = rB.
and forms h-pgshp = gB. They exchange gA and gB
and compute collision element X as Ag = h-dgBthd
and Bg = h-pgAs hp respectively.</p>
      <p>2. Inverse twisted Diffie-Hellman protocol.
Let S be a group.</p>
      <p>Correspondents follow the scheme 1 with the
inverse element g ϵ nEG(K) and Alice sends
h–dg–thd = gA to Bob and she gets h–pgshp = gB from
him. They use the same formulae for Ag and Bg.
But in the new version these elements are mutual
inverses. Alice has X but Bob possesses X–1.</p>
      <p>Both schemes can be implemented with the
multivariate platforms S=TGA(n,K)T–1 and
nES(K).</p>
      <p>Algorithm 2.3.1. Correspondents executes
pairs of directed twisted DH protocols with
platforms P1 = nES(K) and P2 = TGA(n,K)T–1.
Assume that they have outputs H and X.</p>
      <p>Each of correspondents have HX of linear
degree Θ(n) and density Θ(n4).</p>
      <p>They can compute standard form of G=HX, or
use two step procedure to compute G(p) as
1p = H(p) and 2p = X(1p).</p>
      <p>Remark 2.3.1 The density of HX is the
number of monomial terms of this map in its
standard form. It is function of the length of
reimage of X under the homomorphism ή’ sending
u from BP(K) to Tnή(u)T–1. It depends on
d(HX)=d(X)=l(ή’–1 (X)).</p>
      <p>
        Parameter d(X) depends on kA, kB, rA, rB, ή’–
1(g), ή’-1(h) and linear transformation T of the
protocol with the platform TGA(n,k)T–1 [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ].
      </p>
      <p>Thus, adversary does not able to estimate
d(HX).</p>
      <p>Results of computer simulation demonstrate
connection between d(HX) in the case of field Fq
of characteristic 2.</p>
      <p>Table 1 corresponds to the case of sparse
matrix T eith 2n – 1 no zero entries. Table 2
reflects the case of the matrix with n2 nonzero
entries.</p>
      <p>Algorithm 2.3.2. Correspondents executes
pairs of inverse twisted DH protocols with
platforms P1 = nES(K) and P2 = TGA(n,K)T–1.
Assume that Alice has outputs H and X, Bob has
H–1 and X–1 from P1 and P2 respectively.
Correspondents use space of plaintexts (K*)n and
space of ciphertexts Kn.</p>
      <p>Alice and Bob encrypt via HX and H–1X–1 and
decrypt via XH and X–1 H–1.</p>
      <p>Remark 2.3.2. In the case of inverse
protocols. The access control does not use the
extraction of information from knowledge base B.
Alice enters the access password P and sends
HX(P) it to Bob. He restores the P and enters B.</p>
      <p>Alternatively Bob enters the access password
P andsends H–1X–1(P) to Alice. She restores P and
puts as entrance rule to the system.</p>
      <p>
        Usage of transformations of kind HX as in
algorithm 2 in the form of public key was
considered in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Classical approach of
Multivariate Cryptography are presented in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
Ideas of fast developing Noncommutative
Cryptography reader can find in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]–[
        <xref ref-type="bibr" rid="ref28">28</xref>
        ].
      </p>
    </sec>
    <sec id="sec-9">
      <title>4. Conclusions</title>
      <p>Multivariate Cryptography started from
studies of bijective transformations G of a vector
space (Fq)n. as possible encryption tools. One can
increase number of variables n in the equation of
kind G(x) = b and rewrite the condition of
existence of solution for this equation in the form
G’(y) = b’ where G’ is quadratic transformation
of V = (Fq)m where m is essentially larger than n,
y and b’ are vectors from V.</p>
      <p>The complexity of initial and rewritten
systems of equations are essentially differs.
Anyway this possibility motivates studies of
quadratic maps as tools for Public Key
Cryptography.</p>
      <p>All algorithms of Multivariate Cryptography
under NIST investigation were based on quadratic
equations and were not selected as finalists. The
first four winners of the NIST competition are
described in term of Lattice based Cryptography.</p>
      <p>We have to mention that NIST project
compares implementations of some public keys as
products of Software Engineering. On the level of
Theoretical Computer Science all 5 classic
direction of Post Quantum Cryptography
inclusive Multivariate Cryptography have future
perspectives because they are based on known
NP-hard problems. One of such problems is about
finding solution of nonlinear system of m = m(n)
equations in n variables.</p>
      <p>We already mention that restriction on the case
of quadratic equations is not well motivated.
Outcomes of NIST project motivates for search of
efficient and secure public keys based on
multivariate transformation of unbounded degrees
of affine space Kn defined over finite commutative
ring K.</p>
      <p>
        Noteworthy that some efficient public keys
over finite fields and arithmetical rings Zm are
suggested in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. They use no bijective
transformations of Kn of unbounded linear degree
d(n). Crypto analytical instruments for breaking
these algorithms are not founded yet. Other idea
to use hard problems of Noncommutative
Cryptography in case of platform-semigroups of
multivariate transformations is explored in this
paper.
      </p>
    </sec>
    <sec id="sec-10">
      <title>5. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Post-Quantum</surname>
            <given-names>Cryptography</given-names>
          </string-name>
          : Call for Proposals, https://csrc.nist.gov/.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <source>Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center, in Workshop on Emerging Technology Trends on the Smart Industry and the Internet of Things</source>
          , vol.
          <volume>3149</volume>
          ,
          <year>2022</year>
          , pp.
          <fpage>107</fpage>
          -
          <lpage>117</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <article-title>Analysis of 2-isogeny properties of generalized form Edwards curves</article-title>
          ,
          <source>in: Proceedings of the Workshop on Cybersecurity Providing in Information and Telecommunication Systems, July</source>
          <volume>7</volume>
          ,
          <year>2020</year>
          , vol.
          <volume>2746</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <article-title>Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves</article-title>
          ,
          <source>in Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3187</volume>
          , no.
          <issue>1</issue>
          ,
          <issue>2022</issue>
          , pp.
          <fpage>302</fpage>
          -
          <lpage>309</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A. C.</given-names>
            <surname>François</surname>
          </string-name>
          , Xavier Standaert,
          <year>Eurocrypt 2021</year>
          , LNCS
          <volume>12696</volume>
          , 40th Annual International Conference on the Theoryand Applications of Cryptographic Techniques,
          <string-name>
            <surname>part</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <source>On the Extremal Graph Theory and Symbolic Computations, Dopovidi National Academy of Sci, Ukraine</source>
          , no.
          <issue>2</issue>
          ,
          <issue>2013</issue>
          , pp.
          <fpage>42</fpage>
          -
          <lpage>49</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wroblevska</surname>
          </string-name>
          ,
          <article-title>On the key exchange with nonlinear polynomial maps of stable degree</article-title>
          ,
          <source>Annalles UMCS Informatica AI X1</source>
          ,
          <volume>2</volume>
          ,
          <year>2011</year>
          , pp.
          <fpage>81</fpage>
          -
          <lpage>93</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Klisowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <article-title>On the Comparison of Cryptographical Properties of Two Different Families of Graphs with Large Cycle Indicator</article-title>
          , Mathematics in Computer Science, vol.
          <volume>6</volume>
          , no.
          <issue>2</issue>
          ,
          <issue>2012</issue>
          , pp.
          <fpage>181</fpage>
          -
          <lpage>198</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Klisowski</surname>
          </string-name>
          ,
          <article-title>On Noncommutative Cryptography with Cubical Multivariate Maps of Predictable Density</article-title>
          , in Computing Conference, Londone, vol.
          <volume>2</volume>
          ,
          <source>Part of Advances in Intelligent Systems and Computing (AISC)</source>
          , volume
          <volume>998</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>654</fpage>
          -
          <lpage>674</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <source>On New Multivariate Cryptosystems based on Hidden Eulerian Equations, Dopov. Nath Acad of Sci, Ukraine</source>
          , no.
          <issue>5</issue>
          ,
          <issue>2017</issue>
          , pp
          <fpage>17</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <source>On New Multivariate Cryptosystems based on Hidden Eulerian Equations over Finite Fields, Cryptology ePrint Archive</source>
          ,
          <volume>093</volume>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>L.</given-names>
            <surname>Goubin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Patarin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.-Y.</given-names>
            <surname>Yang</surname>
          </string-name>
          , Multivariate Cryptography,
          <source>Encyclopedia of Cryptography and Security</source>
          , 2nd ed.,
          <year>2011</year>
          , pp.
          <fpage>824</fpage>
          -
          <lpage>828</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>D.</given-names>
            <surname>Moldovyan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Moldovyan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A New</given-names>
            <surname>Hard</surname>
          </string-name>
          <article-title>Problem over Non-commutative Finite Groups for Cryptographic Protocols</article-title>
          ,
          <source>International Conference on Mathematical Methods</source>
          , Models, and
          <article-title>Architectures for Computer Network Security, MMM-ACNS 2010</article-title>
          , pp.
          <fpage>183</fpage>
          -
          <lpage>194</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>L.</given-names>
            <surname>Sakalauskas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Tvarijonas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Raulynaitis</surname>
          </string-name>
          ,
          <article-title>Key Agreement Protocol (KAP) Using Conjugacy</article-title>
          and Discrete Logarithm Problema in Group Representation Level, Informatica, vol.
          <volume>18</volume>
          , no.
          <issue>1</issue>
          ,
          <issue>2007</issue>
          , pp.
          <fpage>115</fpage>
          -
          <lpage>124</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>V.</given-names>
            <surname>Shpilrain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ushakov</surname>
          </string-name>
          ,
          <article-title>The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient</article-title>
          ,
          <source>Applicable Algebra in Engineering, Communication and Computing</source>
          , vol.
          <volume>17</volume>
          ,
          <issue>iss</issue>
          . 3-
          <issue>4</issue>
          ,
          <year>2006</year>
          , pp
          <fpage>285</fpage>
          -
          <lpage>289</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>D.</given-names>
            <surname>Kahrobaei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <article-title>A non-commutative generalization of ElGamal key exchange using polycyclic groups</article-title>
          ,
          <source>in IEEE GLOBECOM Global Telecommunications Conference [4150920]</source>
          ,
          <year>2006</year>
          . doi:
          <volume>10</volume>
          .1109/glocom.
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Cao</surname>
          </string-name>
          , New Directions of Modern Cryptography. Boca Raton: CRC Press, Taylor &amp; Francis Group,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>B.</given-names>
            <surname>Fine</surname>
          </string-name>
          , et al.,
          <source>Aspects of Non abelian Group Based Cryptography: A Survey</source>
          and Open Problems, arXiv:
          <fpage>1103</fpage>
          .
          <fpage>4093</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>A.</given-names>
            <surname>Myasnikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Shpilrain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ushakov</surname>
          </string-name>
          ,
          <article-title>Non-commutative Cryptography and Complexity of Group-theoretic Problems</article-title>
          .
          <source>American Mathematical Society</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>I.</given-names>
            <surname>Anshel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Anshel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Goldfeld</surname>
          </string-name>
          ,
          <article-title>An Algebraic Method for Public-Key Cryptography</article-title>
          ,
          <source>Math. Res. Lett</source>
          .
          <volume>6</volume>
          (
          <issue>3-4</issue>
          ),
          <year>1999</year>
          , pp.
          <fpage>287</fpage>
          -
          <lpage>291</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S. R.</given-names>
            <surname>Blackburn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. D.</given-names>
            <surname>Galbraith</surname>
          </string-name>
          ,
          <source>Cryptanalysis of Two Cryptosystems based on Group Actions, in Advances in Cryptology-ASIACRYPT'99. Lecture Notes in Computer Science</source>
          , vol.
          <volume>1716</volume>
          ,
          <year>1999</year>
          , pp.
          <fpage>52</fpage>
          -
          <lpage>61</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>P. H.</given-names>
            <surname>Kropholler</surname>
          </string-name>
          , et al.,
          <article-title>Properties of Certain Semigroups and Their Potential as Platforms for Cryptosystems</article-title>
          ,
          <source>Semigroup Forum 81</source>
          ,
          <year>2010</year>
          , pp.
          <fpage>172</fpage>
          -
          <lpage>186</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Lopez Ramos</surname>
          </string-name>
          , et al.,
          <source>Group Key Management based on Semigroup Actions, Journal of Algebra and Its Applications</source>
          , vol.
          <volume>16</volume>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Myasnikov</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>Roman'kov, A Linear Decomposition Attack, Groups Complex</article-title>
          . Cryptol., vol.
          <volume>7</volume>
          , no.
          <issue>1</issue>
          ,
          <issue>2015</issue>
          , pp.
          <fpage>81</fpage>
          -
          <lpage>94</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>V. A.</given-names>
            <surname>Roman</surname>
          </string-name>
          <article-title>'kov, A Nonlinear Decomposition Attack, Groups Complex</article-title>
          . Cryptol., vol.
          <volume>8</volume>
          , no.
          <issue>2</issue>
          ,
          <issue>2016</issue>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>207</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>V.</given-names>
            <surname>Roman</surname>
          </string-name>
          <article-title>'kov, An improved version of the AAG cryptographic protocol</article-title>
          , Groups, Complex.,
          <source>Cryptol</source>
          ,
          <volume>11</volume>
          , No.
          <volume>1</volume>
          (
          <issue>2019</issue>
          ),
          <fpage>35</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ben-Zvi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kalka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Tsaban</surname>
          </string-name>
          , Cryptanalysis via Algebraic Span, in Advances in Cryptology, CRYPTO, 38th Annual International Cryptology Conference,
          <string-name>
            <surname>part</surname>
            <given-names>I</given-names>
          </string-name>
          , vol.
          <volume>10991</volume>
          ,
          <year>2018</year>
          , pp.
          <fpage>255</fpage>
          -
          <lpage>274</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>B.</given-names>
            <surname>Tsaban</surname>
          </string-name>
          ,
          <article-title>Polynomial-time solutions of computational problems in noncommutativealgebraic cryptography</article-title>
          ,
          <source>J. Cryptol</source>
          .
          <volume>28</volume>
          , No.
          <volume>3</volume>
          (
          <issue>2015</issue>
          ),
          <fpage>601</fpage>
          -
          <lpage>622</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>