<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Workshop on Cybersecurity Providing in Information and Telecommunication Systems, February</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Expanding Extremal Graphs and Implemented Solutions of Post Quantum Cryptography</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vasyl Ustimenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Pustovit</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Telecommunications and the Global Information Space of the National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>13 Chokolivsky ave., Kyiv, 02000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Royal Holloway in London</institution>
          ,
          <addr-line>Egham Hill, Egham TW20 0EX</addr-line>
          ,
          <country country="UK">United Kingdom</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>28</volume>
      <issue>2023</issue>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Extremal properties of graphs CD(n, q) and A(n, q) can be efficiently used for the construction of LDPC codes and stream ciphers. Recently pseudorandom walks on these graphs were used for the constructions of key agreement protocols of postquantum cryptography. We use these graphs to introduce a new algorithm for the generation of unperiodical infinite string of field characters. Its input is selected as a finite “seed” of elements of a corresponding finite field. This algorithm has postquantum stability i.e., the adversary has to deal with the intractable problem of postquantum cryptography to get the seed. We combine this algorithm with the postquantum secure protocol of noncommutative cryptography for the elaboration of collision seed. This combination can be used for one-time pad delivery of pseudorandom or random sequence from one person involved in protocol to another one and constructions of new MACs. We introduce the generalization of these algorithms for the case of a general finite commutative ring.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Extremal Graph Theory</kwd>
        <kwd>Post Quantum Cryptography</kwd>
        <kwd>Computer Algebra</kwd>
        <kwd>stable subgroups of affine Cremona group</kwd>
        <kwd>key exchange protocols</kwd>
        <kwd>random and pseudorandom sequences</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In March 2021 it was announced that the
prestigious Abel Prize will be shared by
A. Wigderson and L. Lovasz. They contribute
valuable applications of the theory of Extremal
graphs [1, 2] and Expanding graphs [3] to
Theoretical Computer Science. We have been
working on applications of these graphs to
Cryptography ([4, 5] and further references).</p>
      <p>The one-time pad is a practical implementation
of the idea of absolutely secure encryption. A
symbiotic combination of this encryption tool
with key exchange Diffie–Hellman protocol was
widely used. The appearance of the first versions
of quantum computers and cryptanalysis of
algorithms based on discrete logarithm problems
demands a new algorithm of “post-quantum
secure” generation of pseudorandom string S of
characters of the chosen alphabet. Quantum
technologies allow the production of genuine
random string G of a chosen length. One-time pad
encryption of G with the key S will allow the safe
delivery of string G from the correspondent to
his/her partner [6–8].</p>
      <p>In this paper, we use a sequence of known
expanding graphs A(n, q) for the solution of
described above task in the case of alphabet Fq.
Analogs of these graphs defined over arbitrary
commutative ring K allow the introduction
algorithm of postquantum secure generation of S
in the case of alphabet K.</p>
      <p>Our algebraic graphs-based technique differs
from classical number-theoretical methods, you
can compare our algorithms with those presented
in [9–39].</p>
      <p>These new algorithms are described in Section
3 in terms of graphs A(n, K) with references to
their known properties and properties of
polynomial transformation groups GA(n, K) of
affine space Kn related to A(n, K). The most
important is the following “stability property” of
GA(n, K).</p>
      <p>In the chosen basis maximal degree of
elements of GA(n, K) has degree 3. Notice that the
composition of two randomly chosen nonlinear
polynomial maps of degrees k and l in general
position with the probability close to 1 will have
degree kl.</p>
      <p>Required properties of graphs A(n, K) can be
justified via an enveloping family of graphs
D(n, K) and their connected components
CD(n, K) (see Section 3 of the paper and further
references). Known facts and conjectures about
these graphs are presented there, and references
on the usage of graphs in symmetric cryptography
and the theory of LDPC codes are given.</p>
      <p>Section 3 also describes applications of the
main algorithm to the construction of new
postquantum secure Message Authentication
Codes (MACs). These constructions are the
generalization of MACs presented in [40], it gives
new options to increase the level of avalanche
effect.</p>
      <p>In Section 3 also a symbiotic combination of
the main algorithm of generation of a potentially
infinite string of characters with the postquantum
secure Key Agreement Protocol based on
computations in the group GA(n, K) is described.</p>
      <p>The initial data for this string generator are
given via “seed of finite length” in the form of a
tuple of characters of finite length.
Correspondents can execute the Key Agreement
Protocol with the collision map G from GA(n, K)
and extract the required seed from G.</p>
      <p>We hope that this combination is capable to
replace in the current postquantum reality a
former symbiotic composition of the Diffie–
Hellman algorithm with a classical one-time pad.</p>
      <p>Application 3 from Section 3 gives an
alternative to the one-time pad encryption
symmetric encryption algorithm. Its password can
be extracted from the output of the algorithm of
generation of a potentially infinite string of
characters from K. The complexity of this stream
cipher is O(n).</p>
      <p>The encryption map of this algorithm is a
polynomial map of unbounded degrees. It can be
used similarly to a public key without the change
of password for unlimited time. Implemented a
simpler version of this algorithm with the
encryption map of degree 3 can be used safely
O(n2) times. Section 4 is dedicated to the idea of
changing graphs A(n, K) on well-known graphs
D(n, K). The results of the computer simulation
are presented at the end of Section 4. Given
densities of cubical maps allow us to evaluate the
“usage interval” of encryption with a taken
password.</p>
      <p>Correspondents can change passwords via an
algorithm of generation of potentially infinite
strings of characters. No need to repeat the
GA(m, K) protocol which costs O(m13) elementary
operation. Execution time for the generation of the
element of GA(n, K) is useful for the time
evaluation of the main algorithm of Section 3.
Conclusions from Section 5.</p>
    </sec>
    <sec id="sec-2">
      <title>2. On Current State of Post Quantum</title>
    </sec>
    <sec id="sec-3">
      <title>Cryptography</title>
      <p>Prototype models of probabilistic machines
known as Quantum computers already exist. They
can produce genuine random sequences of bits
that can be used in information security instead of
pseudo-random strings.</p>
      <p>The perfect symbiosis of one-time encryption
with Diffie–Hellman protocol for the key
exchange can’t be used safely anymore because
the Discrete logarithm problem can be efficiently
solved with the usage of a Turing machine
together with a Quantum Computer. A
combination of these two machines can be used
for effective cryptanalysis of RSA (the result of
Peter Shor, 1995).</p>
      <p>Investigation of public keys with potential
resistance to quantum attacks has been supported
by U.S. NIST international project supporting
Post Quantum standardization process since 2017.
In July 2020 the third round started for the final
further investigation of already selected
algorithms. In the area of Multivariate
Cryptography, only rainbow-like oil and vinegar
digital signatures are selected for further
investigation. They can’t be used as encryption
algorithms.</p>
      <p>During Third Round, some cryptanalytic
instruments to deal with ROUV were found [41].
That is why different algorithms were chosen at
the final stage. In July 2022 first four winners of
the NIST standardization competition were
chosen. They all are lattice-based algorithms.</p>
      <p>This fact motivates different from public key
directions of Multivariate Cryptography such as
the search for Postquantum Secure Key
Agreement Protocols able to substitute symbiotic
combinations of Diffie–Hellman protocol and
one-time pad.</p>
    </sec>
    <sec id="sec-4">
      <title>3. Equations of Q-Regular Tree and</title>
    </sec>
    <sec id="sec-5">
      <title>String Processing</title>
      <p>The description of the q-regular tree Tq in
terms of equations was introduced in [42] where
graphs CD(n, q) were introduced. Tq coincides
with well-defined projective limit CD(q) of
graphs CD(n, q) where n tends to infinity.</p>
      <p>It was discovered later that special
homomorphic images A(n, q) of CD(n, q) form a
family of q-regular small world graphs in the
sense of [1]. Well-defined projective limit A(n, q),
n = 2, 3, … coincides with Tq. [4].</p>
      <p>This construction allows introducing Tq as a
qregular bipartite graph with points of kind
and lines
(p) = (p1, p2, …, p1, …)
[l] = [l1, l2, …, li, …],
where only a finite number of coordinates pi and li
are different from zero and point (p) and line [l]
are incident if and only if the following relations
hold
p2-l2 = l1p1, p3-l3 = p1l2, p4-l4 = l1p3, ….,
p2sl2s = l1p12s-1, p2s+1-l2s+1 = p1l2s-,… .</p>
      <p>Brackets and parenthesis allow us to
distinguish points from lines.</p>
      <p>Projections of (p) and [l] onto (p1, p2, …, pn)
and [l1, l2, …, ln] define graph homomorphism on
graph A(n, q) with point set and line set
isomorphic to (Fq)n and the incidence is given by
first n-1 equations in the definition of Tq.</p>
      <p>We can change finite field F in the given above
construction for arbitrary commutative ring K
with unity and get infinite graph TK together with
bipartite graph A(n, K) for which two copies of Kn
form partition sets. If K is the integrity ring then
TK = A(K) is also an infinite tree but the existence
of zero divisors leads to the appearance of cycles
in these graphs.</p>
      <p>The first coordinates ῤ(p) = p1 and ῤ([l]) = l1
are the natural colors of points (p) and [l] of
graphs A(n, K) and A(K).</p>
      <p>The following linguistic property holds. For
each vertex v there is a unique neighbor u of
chosen color ῤ(u) = a. Let Na(v) be the operator of
taking the neighbor of v with color a.</p>
      <p>
        The walk in the graph A(n, K), n = 2, 3, … of
length m started at the given point p = (p1, p1, …)
can be given by sequence a(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), a(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), …, a(m), this
is a sequence
(p), v1 = Na(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )(p), v2 = Na(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )(v1), …, vm = Na(m)(vm-1).
      </p>
      <p>
        We refer to string (a(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), a(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), ..., a(m)) as the
direction of the walk. In the case of even m we
consider transformation nC(a(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), a(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), …, a(m))
of Kn into itself defined in the following way.
      </p>
      <p>Take the list of variables x1, x2, …, xn and
consider K[x1, x2, …, xn] together with new graph
A(n, K[x1, x2, …, xn]) given by the same equations
as in the case A(n, K).</p>
      <p>
        Take special starting point (x) = (x1, x2, …., xn)
and colour string x1+a(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), x1+a(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), …, x1+a(m)
compute
(x), v1 = Na(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )+x(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) (p), v2 = Na(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )+x(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )(v1), …, vm =
= Na(m)+x(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )(vm-1) where x1 = x(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ).
      </p>
      <p>
        Finally take the polynomial transformation
C(a(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), a(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), …, am)) of Kn into itself sending (x)
to vm. This transformation is given by the rule
(x) → (f1, f2, …fn) = vm.
      </p>
      <p>We see that each point-to-point walk w on
vertices of such graph started in chosen origin (0
points) can be given by its direction which is a
tuple of kind w = (a1, a2, …, a2s) with ai ϵ K. With
such direction we associate the tuple</p>
      <p>nC(w) = (f1, f2, …fn),
where fi ϵ R = K[x1, x2, … , xn]. It can be proven
that the maximal degree of fi ϵR such that degree
deg(fi) is 3. We identify this tuple with the map
nC(w) of kind xi → fi(x1, x2, …xn), I = 1, 2, …, n
which is a bijective polynomial transformation of
affine space (K)n.</p>
      <p>The natural composition of walks from 0
origins can be formally given by the following
rule.</p>
      <p>For w = (a1, a2, …a2s) and u = (u1, u2, …u2t)
their composition w◦u is the tuple
(a1, a2, …a2s, a2s +u1, a2s+u2, …, a2s +u2t).</p>
      <p>Let ∑(K) be the semigroup of all directions
with the introduced above operation. This is a
semi-direct product of free semigroup over
alphabet K and additive group (K, +) which can
be considered as a modification of a free product
(K, +) with itself.</p>
      <p>It is easy to check that the composition nC(w)
nC(u) coincides with nC(w◦u). So transformations
nC(w), wϵ∑(K) form a subgroup GA(n, q) of group
Aut K[x1, x2, …, xn] which acts on the affine space
(K)n as group CG((K)n) (affine Cremona group) of
all bijective polynomial maps of (K)n into itself. It
means that the map ήn: ∑(K) → GA(n, K) sending
w to nC(w) is a homomorphism and its image
GA(n, K) is a stable one of degree 3, i.e. maximal
degree of the map from this group is 3.</p>
      <p>Similarly, we can define homomorphism ή of
∑(K) onto GA(K) acting on points of infinite
graph A(K).</p>
      <p>For studies of walks corresponding to
directions (y) of length m we extend the field K to
commutative ring K[y1, y2, …, ym] and consider
the special direction (y) = (y1, y2, …, ym) of graph
An(K[y1, y2, …, ym]) where m is even number.</p>
      <p>Elements of this group are ήn(C(y)) where ήn is
a homomorphism of ∑(K[y1, y2, …, ym]) onto
C((K[y1, y2, …, ym])n). Each of them can be
written as a rule xi → fi(x1, x2, …, xn, y1, y2, …, ym),
i = 1, 2, …, n. The degree of each polynomial in
variables x1, x2, …, xn (degx) is bounded by 3. It
possible to prove that degree of fi in variables
y1, y2, …, ym (degy(fi)) is i.</p>
      <p>
        A(K) based string generation algorithm:
Choose even parameters m and increasing
sequence of even numbers n(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), n(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), n(k), where
n(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) ≤ m, n(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) &lt;n (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) &lt; C3n(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), n(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) &lt; n(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) &lt; C3n(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), …, n(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) &lt;n(k) &lt; C3n(k-1).
      </p>
      <p>Consider the word (y) = (y1, y2, …, ym) and a
string of characters b1, b2, …, bn from K*. Form
affine transformation T of K n to K n given by the
rule
x1 → b1x1+b2x2+… bnxn, xi → xi, i = 1, 2, …, n.</p>
      <p>
        Step 1. Compute F(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = Tήn(y)T-1 for n = n(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
given by tuple ( yf1, yf2, … yfn) fn = f(y). Take
polynomial f(y) = b1yf1+b2 yf2+ …+bn yfn and list
(z1, z2, …, zt), t = C3n of its coefficients in front of
monomial terms xixjxk where i,j,k are different
elements of {1, 2, …n}. Let
      </p>
      <p>
        3v(f(y)) = (z1, z2, …, zt) = y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ).
      </p>
      <p>Take operator Dn = d/dx1+ d/dx2+…+d/dxn.
Let us list r = C2n coefficients of D(f(y)) in front
of xixj, i ≠ j and get 2v(f(y)) = (u1, u2, …, u1).
Finally list coefficients of D2(f(y)) in front of xi and
get 1v(f(y)) = (q1, q2, …, qn).</p>
      <p>
        Step 2. Notice that y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = 3v(f(y)) is an element
(y’1, y’2, …, y’m(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) of ∑(K[y1, y2, …, ym]). Select
n(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ). Consider the list of variables x1, x2, … xn(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
under the assumption that the indexes correspond
to first n(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) triples of kind {k, r, s} accordingly to
a lexicographical order. Let c be this
correspondence. We set 1bi = brbsbk if
c(i) = {r, s, k} and form linear transformation T(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
of kind x1 → 1b1x1+1b2x2+…1bnxn(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), xi → xi,
i = 2, 3, …, n(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ).
      </p>
      <p>
        Compute F(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = T(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )ήn(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )(3v(f(y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )))T(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
1, n &lt; n(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) ≤ C3n given via the tuple
(y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) f1, y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) f2, …, y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) fn(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )).
      </p>
      <p>
        Let f(y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) = y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )fn(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) and
3v(f(y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) = (2z1, 2z2, …2zt(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) = y(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) be the list of
coefficients in front of monomial terms xixjxk
where i,j,k are different elements of
{1, 2, …, n(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )}.
      </p>
      <p>
        Take operator Dn(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = d/dx1+d/dx2+… d/dxn(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ).
List r = C2 n(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) coefficients of Df(y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) in front of
xixj, i ≠ j and get 2v(f(y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ))) = (2u1, 2u2, …2un(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ).
2
      </p>
      <p>
        Finally list coefficients of D n(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )f(y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) in front
of xi and get 1v(f(y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) = (1u1, 1u2, …1un(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )).
      </p>
      <p>
        Step 3. Use n(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), n(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )&lt;n(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )≤C3n(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ). Consider
the list of variables x1, x2, … xn(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) under the
assumption that the indexes correspond to first
n(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) triples of kind {k, r, s} accordingly to a
lexicographical order. Let c be this
correspondence. We set
      </p>
      <p>
        2bi = 1br 1bs 1bk if c(i) = {r,s,k}
and form linear transformation T(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) of kind
x1 → 1b1x1+1b2x2+…1bnxn(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), xi → xi, i =
      </p>
      <p>
        =2,3, … ,n(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ).
      </p>
      <p>
        Compute F(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) = T(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )ήn(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )(3v(f(y(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )))T(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) -1,
n&lt;n(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )≤C3n given via the tuple
(y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) f1, y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) f2, …, y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) fn(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )).
      </p>
      <p>
        Let f(y(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )) = y(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )fn(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) and
      </p>
      <p>
        3v(f(y(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )) = (2z1, 2z2, …2zt(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) = y(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
be the list of coefficients in front of monomial
terms xixjxk where i,j,k are different elements of
{1, 2, …, n(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )}.
      </p>
      <p>
        Continue this process till the last potentially
infinite Step k. After the end of the computation
process we have to take sequence
e(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), e(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), …, e(k) with e(i)ϵ{12, 3} and
concatenate e(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )v(f(y)), e(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )v(f(y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )),…,
e(k)v(f(y(k1)) to get tuple Rk as an output.
      </p>
      <p>Application 1. Correspondents use chosen
Key Agreement Protocol to elaborate two
collision strings of kind b = (b1, b2, …., bn),
bi ϵ K-{0} and a = (a1, a2, …, am) such that
ai ≠ ai+2, i = 1, 2, …, m-1, a2 ≠ 0.</p>
      <p>
        They specialize variables yi as y1 = a1,
y2 = a2, …, ym = am, form affine transformation T
corresponding to vector b, and execute “numerical
implementation” of A(K) based string generation
algorithm. The output contains cubical maps
F(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), F(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), …, F(k) depending on n(i) variables.
      </p>
      <p>
        Alice and Bob agree on e(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), e(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), …, e(k) in
an open way or with the usage of secure
agreement protocol. So they can use
concatenation C = (c1, c2, …, cl) of
specializations
      </p>
      <p>
        e(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )v(f(y)), e(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )v(f(y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )), …, e(k)v(f(y(k-1))
with yi = ai, i = 1, 2, … m as cryptographical
stable string of polynomial length l = l(n, k).
      </p>
      <p>One of the correspondents can generate a
random or quasirandom string produced by a
modern quantum device of characters
P = (p1, p2, …, pl) to send
P+C = (p1+c1, p2+c2, …, pn+cn) to his/her
partner. So they can use substrings of C as
passwords for one-time pad encryption. In [43] we
present the results of computer simulation via the
table of number monomial terms in polynomial
maps F(i), i = 1, 2, …, n.</p>
      <p>Application 2. Correspondents use chosen
Key Agreement Protocol to elaborate one
collision string of kind b = (b1, b2, …, bn), b1 ϵ
K{0}. They form affine transformation T
corresponding to vector b. They use symbolic
implementation of the presented above A(n, K)
based string processing algorithm working with
variables yi, i = 1, 2, …, m. The output of this
algorithm is e(k)v(f(y(k-1)) = e(k)d(y1, y2, …, ym),
where e(k)ϵ{1, 2, 3}.</p>
      <p>They take text a1, a2, …, am of large length
m, m&gt;&gt;n(k) apply following parity regularization
procedure which produce string a’1, a’2, …, a’m
such that a1 = a1’, a2’ = a2 if a2 ≠ 0 and a’2 = a2+1
in opposite case, a’i+2 = aI+2 if ai+2 ≠ a’i and
a’i+2 = ai+2+1 otherwise for i = 1, 2, …, m-2.</p>
      <p>Alice and Bob compute
e(k)d(a’1, a’2, …, a’m) = dk(a), k = 1, 2, …, s and
treat them as a sequence of digests of text a. Each
of dk(a) is a Message Authentication Code (MAC)
depending on the key b = (b1, b2, …, bn). The
computer experiment described in [40]
demonstrates a high avalanche effect of digest
d1(a). A single change of character a implies the
change of 98% of characters of the digest. The
experiment shows the increase of avalanche effect
for dk(a), k&gt;1 with the growth of parameter i. The
following algorithm is developed in the spirit of
noncommutative cryptography [44–55].</p>
      <p>The protocol [56]. For elaboration of string
b1, b2, …, bn and a1, a2, …, am we use the
following protocol which also uses
homomorphism ήn of ∑(K) into GAn(K).</p>
      <p>
        Alice selects parameters n and m and words
w1, w2, ... wk, k&gt;1 and words u and z of finite even
length from ∑(K). Let u = (a1, a2, …, as). We refer
to Rev(u) = (-as+as-1, -as+as-2, …, -as+a1, -as) as a
reversing string for u. It is easy to see that
ηn(uRev(u)) is the unity of affine Cremona
semigroup CG(Kn). Alice selects affine
transformation T1 ϵAGLn(K) and T2 ϵAGLm(K) in
“general position” and computes T1-1 together
with T2-1. She forms Fi = T1ήn(uwiRev(u))T1-1 and
Gi = T2ήn(zwiRev(z))T2-1 for i = 1, 2, ..., k. She
sends pairs (Fi, Gi), i = 1, 2, ... k to Bob. He
uses formal alphabet {x1, x2, ..., xk} to write
word xi(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )k(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) xi(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )k(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) ... xi(s)k(s) of finite length s.
Bob computes specialisations
F = Fi(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )k(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) Fi(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )k(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) ... Fi(s)k(s) and
G = Gi(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )k(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) Gi(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )k(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) ... Gi(s)k(s). He sends F to
Alice but keeps G for himself.
      </p>
      <p>
        Alice has to restore the standard form of G
from F. She knows that the standard projection of
A(n, K) onto A(m, K) induces the homomorphism
μ of GA(n, K) onto GA(m, k) for which
μ(ήn(wi)) = ήm(wi). Element F equals
T1 ήn(u) ήn (w1(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) k(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) wi(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )k(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) ... wi(s) k(s)) ήn(u)-1T11.
So Alice computes ήn
(w1(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) k(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )wi(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )k(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) ... wi(s)k(s)) = F’ because of her
knowledge about T1 and u. She applies μ to F’ and
gets ήm (w1(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )k(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) wi(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )k(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) ... wi(s)k(s)) = G’. Finally,
Alice computes G as T2 ήm(z)G’ήm(Rev(z))T2-1.
The collision transformation G has standard form
xi → gi(x1, x2, …, xm), i = 1, 2, …, m.
      </p>
      <p>So correspondents can take vectors b and a of
length l and t as appropriate numbers of first
coordinates of 3v(gi) and 3v(gj) for chosen distinct
i and j (see also [57] for modifications of
GA(n, K)).</p>
      <p>Complexity estimates. The theoretical
complexity of the above-presented protocol
O(n13) coincides with the complexity of
computation of the superposition of two
polynomial transformations of Kn of degree 3.</p>
      <p>The security of protocol rests on the
postquantum hard problem of decomposition of an
element from the group of bijective affine
transformation of affine space Kn into a word of
several generators. The output of this protocol is
used as a “seed” of the fast algorithm (O(m)) for
generating tuples of non-periodic potentially
infinite length m. Their pseudo-random properties
are currently under investigation. We hope that
new MACs will be effectively used for the
detection of file integrity.</p>
      <p>Application 3. Alice and Bob eject vectors b
and a of the length n (potentially infinite number)
and r (even constant) from the collision map of the
presented protocol or use the presented above
method of generation of potentially infinite
nonperiodic strings. Without loss of generality we
assume that b = (b1, b2, …, bn) ϵ (K*)n and for
(a1, a2,…, ar) the following relations hold
a2 ≠ 0, ai ≠ ai+2, i = 1, 2, …, n-2. Correspondents
form transformation</p>
      <p>T(b): x1 →
x1+b1x2+b2x1+…+bn1xn+bn, xi → xi, i = 1, 2, … n-1.</p>
      <p>Let f1(x), f2(x), …, fr(x) be a string of
polynomials from K[x] of even length r and linear
degree in variable n. We consider a transformation
T[f1, f2, …, fr] of Kn onto Kn obtained via chain of
vertices A(n, K) with initial point (x) = (x1, x2, …, xn)
and vertices [v1], (v2), [v3], ...,(v_r) of colours
f1(x1), f2(x1) …, fr(x,). The map T[f1, f2, …, fr] sends
(x1, x2, …, xn) to...(vr). It is easy to see that if
equation fr(x) = a has a unique solution for
arbitrary a then T[f1, f2, …, fr] is a bijection.</p>
      <p>
        So Alice and Bob can agree via open channel
on sparse (i.e. computable in time O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ))
polynomials xgi of linear degree
a(i)n+b(i), a(i) ≠ 0, i = 1, 2, ...r and select gr as
αxt where α is an element of K*. They will use
fi = xgi+ai and the map
E = T(b)T[f1, f2, …, fr]T(b)-1 as the encryption
map. This stream cipher is fast (time execution is
O(n)), the password b1, b2, …, bn, a1, a2, …, ar is
protected via postquantum secure protocol. That
is why the adversary has the only remaining
option to collect a lot of pairs of kind
plaintext/ciphertext and try to approximate map E.
It is unfeasible because the degree of the
polynomial map is unbounded (≥βn for positive
constant β).
      </p>
      <p>Practically we can use simple encryption maps
of kind G = T(b)ή((a1, a2, …, ar)T(b)-1, i.e. gi = i
for each i and a(i) = 1. In this case, both degrees
of G and G-1 coincide with 3. So adversary has a
chance to interpret O(n3) message and in time
O(n10) approximate these maps via linearisation
attacks.</p>
      <p>Noteworthy that there is a simple solution to
prevent mentioned above attacks. The density
d(G) of G of kind x1 → gi(x1, x2, …, xn),
i = 1, 2, …, n is a total number of monomial
expressions in polynomials gi.</p>
      <p>So correspondents can restrict a maximal
number of messages for exchange by average
density a(G) = d(G)/n.</p>
      <p>
        We find out that d(G) is depending on
parameters n, r ann ring K. Results of computer
simulations for the cases of finite fields Fq,
arithmetical rings Zq and Boolean rings B(
        <xref ref-type="bibr" rid="ref8">8</xref>
        ),
B(
        <xref ref-type="bibr" rid="ref16">16</xref>
        ), B(
        <xref ref-type="bibr" rid="ref32">32</xref>
        ) of cardinality q, where
qϵ{28, 216, 232}. Evaluation of time for generation
of transformation G gives a good approximation
of the execution time of the encryption process.
      </p>
    </sec>
    <sec id="sec-6">
      <title>4. Connections of A(n, q) with Graphs</title>
    </sec>
    <sec id="sec-7">
      <title>D(n, q), Other Graph-based</title>
    </sec>
    <sec id="sec-8">
      <title>Algorithms</title>
      <p>The missing definitions of graph-theoretical
concepts in the case of simple graphs which
appears in this paper can be found in [1]. All
graphs we consider are simple ones, i.e.
undirected without loops and multiple edges.</p>
      <p>When it is convenient, we shall identify Γ with
the corresponding anti-reflexive binary relation
on V(Γ), i.e. E(Γ) is a subset of V(Γ)×V(Γ). The
girth of a graph Γ, denoted by g = g(Γ), is the
length of the shortest cycle in Γ. The diameter
d = d(Γ) of the graph Γ is the maximal length of
the shortest pass between its two vertices.</p>
      <p>Let gx = gx(Γ) be the length of the minimal
cycle through the vertex x from the set V(Γ) of
vertices in graph Γ. We refer to
Cind(Γ) = max{gx, x ∈ V(Γ)} as the cycle
indicator of the graph Γ.</p>
      <p>The family Γi of connected k-regular graphs of
constant degree is a family of small world graphs
if d(Γi)≤ clogk (vi), for some constant c, c&gt;0.</p>
      <p>Recall that family of regular graphs Γi of
degree k and increasing order vi is a family of
graphs of large girth if g(Γi)≥clogk(vi), for some
independent constant c, c&gt;0.</p>
      <p>We refer to the family of regular simple graphs
Γi of degree k and order vi as a family of graphs of
large cycle indicator, if Cind(Γi)≥clogk(vi) for
some independent constant c, c&gt;0.</p>
      <p>Notice that for vertex—transitive graph its
girth and cycle indicator coincide. Defined above
families plays an important role in Extremal
Graph Theory, the Theory of LDPC codes, and
Cryptography (see [4] and further references).</p>
      <p>Below we consider an alternative definition of
a family of graphs A(n, K) and introduce graphs
D(n, K) where n&gt;5 is a positive integer and K is a
commutative ring. In the case of K = Fq we denote
A(n, q) and D(n, q), respectively. We define these
graphs as homomorphic images of infinite
bipartite graphs A(K) and D(K) for which partition
sets P and L are formed by two copies of Cartesian
power KN, where K is the commutative ring and N
is the set of positive integer numbers. Elements of
P will be called points and those of L lines. To
distinguish points from lines we use parentheses
and brackets. If x ∈ V, then(x) ∈ P and [x] ∈ L.</p>
      <p>The description is based on the connections of
these graphs with Kac-Moody Lie algebra with
extended diagram A1.</p>
      <p>The vertices of D(K) are infinite-dimensional
tuples over K. We write them in the following way
(p) = (p0,1, p1,1, p1,2, p21, p22, p’22, p23, …, pi,i, p’i,i,
pi,i+1, pi+1,i, …),
[l] = [l1,0, l1,1, l1,2, l21, l22, l’22, l23, … ,li,i, l’i,i,li,i+1, li
+1,i, …]. We assume that almost all components of
points and lines are zeros. The condition of
incidence of point (p) and line [l] ((p)I[l]) can be
written via the list of equations below.
li,I pi,i = l1,0 pi-1,i; l’i,i-p’i,i = li,i-1 p0,1;
li,i+1pi,i+1 = li,i p0,1; li+1,i-pi+1,i = l1,0 p’i,i. These four
relations are defined for i≥1, (p’1,1 = p1,1, l’1,1 = l1,1).</p>
      <p>Similarly, we define graphs A(K) on the vertex
set consisting of points and lines
(p) = (p0,1, p1,1, p1,2, p21, p22, p23, …, pi,i, pi,i+1, …),</p>
      <p>[l] = [l1,0, l1,1, l1,2, l21, l22, l23, …, li,i, li,i+1, …]
such that point (p) is incident with the line
[l] ((p)I[l], if the following relations between
their coordinates hold: li,i-pi,i = l1,0 pi-1,i;
li,i+1</p>
      <p>Groups GD(n, K) and GA(n, K) of cubical
transformations of affine space Kn associated with
graphs D(n, K) and A(n, K) are interesting objects
of algebraic transformation group theory because
of the composition of two maps of degree 3 for the
vast majority of pairs will have degree 9.</p>
      <p>Applications of these groups to Symmetric
Cryptography are observed in [5], [43] (see also
[61–63]).</p>
      <p>The illustration of densities of cubic map
constructed with the usage of graphs A(n, Fq) and
appropriate linear conjugators are given below
detailed description of the simulation process
reader can find in [64].
pi,i+1 = li,i p0,1.</p>
      <p>
        It is clear that the set of indices A = {(1; 0),
(0; 1), (1; 1), (1; 2), (2; 2), (2; 3), …,
(i1, i), (i, i), …} is a subset in D = {(
        <xref ref-type="bibr" rid="ref1">1, 0</xref>
        ), (0; 1),
(
        <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
        ), (
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ), (2; 2), (
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        )’, …, (i-1, i); (i;
i1); (i, i); (i, i)’, …}. Points and lines of D(K) are Table 1
functions from KD-{(
        <xref ref-type="bibr" rid="ref1">1,0</xref>
        )} and KD-{(
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ) and their The number of monomial terms of the cubic map
restrictions on A-{(
        <xref ref-type="bibr" rid="ref1">1,0</xref>
        )} and A-{(
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        )} define induced by the graph A(n, Fq), q=232.
homomorphism Ψ of graph D(K) onto A(K). length of the word
subFseotrs eAa(cmh) paonsditiDve(mi)ntceognetraimnin≥g2thweeficrostnsmid+e1r  16 32 64 128 256
elements of A and D concerning the above orders. 16 5623 5623 5623 5623 5623
      </p>
      <p>
        Restrictions of points and lines of D(K) onto
D(m)-{(
        <xref ref-type="bibr" rid="ref1">1,0</xref>
        )} and D(m)-{(
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        )} define graph 32 53581 62252 62252 62252 62252
homomorphism D∆(m) with image denoted as
D(n, K). Similarly restrictions of points and lines 64 454375 680750 781087 781087 781087
of A(K) onto A(m)-{(
        <xref ref-type="bibr" rid="ref1">1, 0</xref>
        )} and A(m)-{(
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        )} 128 3607741 6237144 9519921 10826616 10826616
defines homomorphism A∆(m) of graph A(K) onto
graph denoted as A(m, K). Table 2
      </p>
      <p>
        We also consider the map ∆(m) on vertices of
graph D(m, K) sending its point (p)ϵK D(m)-{(
        <xref ref-type="bibr" rid="ref1">1,0</xref>
        )} to Generation time for the map (ms) (graph,
its restriction into D(m)∩A-{(
        <xref ref-type="bibr" rid="ref1">1, 0</xref>
        )} and its line [l] A(n, Fq), case of usage of sparse linear
ϵKD(m)-{(
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        )} to its restriction onto D(m)∩A-{(
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        )}. conjugators)
This map is a homomorphism of D(m, K) onto length of the word
A(n, k), n = |D(m)∩A|-1.  16 32 64 128 256
      </p>
      <p>Graph D(q) = D(Fq) is a q-regular forest. Its 16 20 60 128 260 540
quotients D(n, q) are edge transitive graphs. So 32 308 788 1776 3760 7716
their connected components are isomorphic. 64 3193 8858 23231 53196 113148
Symbol CD(n, q) stands for the graph which is 128 54031 137201 368460 950849 2164037
isomorphic to one of such connected components.</p>
      <p>Family CD(n, q), n = 2, 3, … is a family of Table 3
large girth for each parameter q, q&gt;2 (see [42] Number of monomial terms of the cubic map
and further references). induced by the graph A(n, Fq), case of dense</p>
      <p>The question “Whether or not CD(n, q) is a linear conjugators
family of small world graphs” is still open. length of the word</p>
      <p>Graph A(q), q&gt;2 is a q-regular tree. Graphs  16 32 64 128 256
A(n, q) are not vertex-transitive.</p>
      <p>They form a family of graphs with a large cycle 16 6544 6544 6544 6544 6544
indicator, which is a q-regular family of small- 32 50720 50720 50720 50720 50720
world graphs [58]. 64 399424 399424 399424 399424 399424</p>
      <p>The question “Whether or not A(n, q), 128 3170432 3170432 3170432 3170432 3170432
n = 2, 3, … is a family of large girth” is still open.</p>
      <p>Graphs CD(n, q) and A(n, q) are expanding
graphs (see [59], [60], and [3] for basic
definitions) with spectral gap q-2√q.</p>
    </sec>
    <sec id="sec-9">
      <title>5. Conclusions</title>
      <p>The main result of the paper is a complex
cryptographical algorithm based on a highly
noncommutative group of polynomial
transformations GA(n, K) of Kn, n = 2, 3, …
defined over finite commutative ring K with a
unity.</p>
      <p>In current postquantum reality the idea to
change the cyclic group of Diffie–Hellman
protocol for a noncommutative group or
semigroup with several generators can lead to safe
protocols of Algebraic Postquantum
Cryptography (APQ).</p>
      <p>We suggest using GA(m, K) for the safe
elaboration of collision polynomial map G of
degree 3 from Kn to Km. G is written in its standard
form of Computer Algebra. We can use O(m4) of
its coefficients for the extraction of some “seed” S
of size s(m).</p>
      <p>The protocol costs O(m13) elementary
operations. The security rests on the complexity
of the known hard problem of APQ to find the
decomposition of G into given generators from the
affine Cremona group of polynomial
transformations of Km.</p>
      <p>Correspondents can use a family of groups
GA(n, K) for simultaneous construction of
potentially infinite string R of characters from Kn
of length n with the complexity O(n). Recovery of
seed S is connected with the hard APQ problem of
solving the system of nonlinear equations of
unbounded degree.</p>
      <p>Parts of R can be used as one-time pad keys,
passwords of symmetric stream ciphers, or in
keydependent Message Authentication Codes.</p>
      <p>We also presented new APQ stable MACs and
stream cipher to work with the text of length t in
time O(t) defined in terms of graphs from the
family A(n, K).</p>
    </sec>
    <sec id="sec-10">
      <title>6. Acknowledgments</title>
      <p>This research is partially supported by British
Academy Fellowship for Researchers under Risk
2022.</p>
    </sec>
    <sec id="sec-11">
      <title>7. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>B.</given-names>
            <surname>Bolloba's</surname>
          </string-name>
          , Extremal Graph Theory, Academic Press, London,
          <year>1978</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Grzesik</surname>
          </string-name>
          , D. Krа́l, L.M. Lovа́sz, Elusive Extremal Graphs,
          <string-name>
            <surname>Preprint</surname>
          </string-name>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Hoory</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Linial</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wigderson</surname>
          </string-name>
          .
          <source>Expander Graphs and Their Applications</source>
          ,
          <source>Bull. Amer. Math Soc</source>
          .
          <volume>43</volume>
          (
          <year>2006</year>
          )
          <fpage>439</fpage>
          -
          <lpage>561</lpage>
          . doi:
          <volume>10</volume>
          .1090/s0273-0979-06-01126-8
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Polak</surname>
          </string-name>
          , et al.,
          <article-title>On the Applications of Extremal Graph Theory to Coding Theory and Cryptography</article-title>
          ,
          <source>Electron. Notes Discret. Maths</source>
          .
          <volume>43</volume>
          (
          <year>2013</year>
          )
          <fpage>329</fpage>
          -
          <lpage>342</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.endm.
          <year>2013</year>
          .
          <volume>07</volume>
          .051
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          , et al.,
          <source>On the Constructions of New Symmetric Ciphers Based on NonBijective Multivariate Maps of Pre-Scribed Degree, Secur. Commun. Netw</source>
          . (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1155/
          <year>2019</year>
          /2137561
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Modeling</surname>
            <given-names>CSIKE</given-names>
          </string-name>
          <article-title>Algorithm on Non-Cyclic Edwards Curves</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3288</volume>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <article-title>Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3187</volume>
          , no.
          <issue>1</issue>
          (
          <year>2022</year>
          )
          <fpage>302</fpage>
          -
          <lpage>309</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <source>Computing of Odd Degree Isogenies on Supersingular Twisted Edwards Curves, in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>2923</volume>
          (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>P.</given-names>
            <surname>Beelen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.M.</given-names>
            <surname>Doumen</surname>
          </string-name>
          ,
          <article-title>Pseudorandom sequences from elliptic curves, Finite Fs</article-title>
          .
          <source>Appls. Codin. Theory Cryptogr. Relat. Areas</source>
          (
          <year>2002</year>
          )
          <fpage>37</fpage>
          -
          <lpage>52</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          - 59435-
          <issue>9</issue>
          _
          <fpage>3</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.R.</given-names>
            <surname>Blackburn</surname>
          </string-name>
          , et al.,
          <source>Predicting the Inversive Generator, Lecture Notes in Comput. Sci</source>
          .
          <volume>2898</volume>
          (
          <year>2003</year>
          )
          <fpage>264</fpage>
          -
          <lpage>275</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -40974-8_
          <fpage>21</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.R.</given-names>
            <surname>Blackburn</surname>
          </string-name>
          , et al.,
          <source>Predicting Nonlinear Pseudorandom Number Generators</source>
          , Math. Comp.
          <volume>74</volume>
          (
          <year>2005</year>
          )
          <fpage>1471</fpage>
          -
          <lpage>1494</lpage>
          . doi:
          <volume>10</volume>
          .1090/S0025-5718-04-01698-9
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Bourgain</surname>
          </string-name>
          ,
          <article-title>Mordell's Exponential Sum Estimate Revisited</article-title>
          ,
          <source>J. Amer. Math. Soc</source>
          .
          <volume>18</volume>
          (
          <year>2005</year>
          )
          <fpage>477</fpage>
          -
          <lpage>499</lpage>
          . doi:
          <volume>10</volume>
          .1090/S0894-0347- 05-00476-5
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>N.</given-names>
            <surname>Brandstätter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Winterhof</surname>
          </string-name>
          , Some Notes On the
          <string-name>
            <surname>Two-Prime</surname>
            <given-names>Generator</given-names>
          </string-name>
          ,
          <source>IEEE Trans. Inform. Theory</source>
          ,
          <volume>51</volume>
          (
          <issue>10</issue>
          ) (
          <year>2005</year>
          )
          <fpage>3654</fpage>
          -
          <lpage>3657</lpage>
          . doi:
          <volume>10</volume>
          .1109/TIT.
          <year>2005</year>
          .855615
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>T.W</given-names>
            <surname>Cusick</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Ding A. Renvall</surname>
          </string-name>
          , Stream Ciphers and
          <string-name>
            <given-names>Number</given-names>
            <surname>Theory</surname>
          </string-name>
          , North-Holland Math. Libr.
          <volume>66</volume>
          (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>G.</given-names>
            <surname>Dorfer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Winterhof</surname>
          </string-name>
          ,
          <article-title>Lattice structure and linear complexity profile of nonlinear pseudorandom number generators</article-title>
          ,
          <source>Appl. Algebra Engrg. Comm. Comput</source>
          .
          <volume>13</volume>
          (
          <year>2003</year>
          )
          <fpage>499</fpage>
          -
          <lpage>508</lpage>
          . doi:
          <volume>10</volume>
          .1007/s00200-003-0116-6
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Y.-C. Eun</surname>
            , H.-Y. Song,
            <given-names>M.G.</given-names>
          </string-name>
          <string-name>
            <surname>Kyureghyan</surname>
          </string-name>
          ,
          <article-title>One-Error Linear Complexity Over Fp of Sidelnikov Sequences</article-title>
          ,
          <source>Sequences and Their Applications SETA 2004, Lecture Notes in Comput. Sci</source>
          .
          <volume>3486</volume>
          (
          <year>2005</year>
          )
          <fpage>154</fpage>
          -
          <lpage>165</lpage>
          . doi:
          <volume>10</volume>
          .1007/11423461_
          <fpage>9</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>É. Fouvry</surname>
          </string-name>
          , et al.,
          <source>On the Pseudorandomness of the Signs of Kloosterman Sums, J. Aust. Math. Soc</source>
          .
          <volume>77</volume>
          (
          <year>2004</year>
          )
          <fpage>425</fpage>
          -
          <lpage>436</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>J.B. Friedlander</surname>
            ,
            <given-names>C. Pomerance I. Shparlinski</given-names>
          </string-name>
          ,
          <article-title>Period of the Power Generator and Small Values of Carmichael's Function</article-title>
          , Math. Comp.
          <volume>70</volume>
          (
          <year>2001</year>
          )
          <fpage>1591</fpage>
          -
          <lpage>1605</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>J.B. Friedlander</surname>
            ,
            <given-names>C. Pomerance I. Shparlinski</given-names>
          </string-name>
          , Corrigendum to:
          <article-title>Period of the Power Generator and Small Values of Carmichael's Function</article-title>
          , Math. Comp.
          <volume>71</volume>
          (
          <year>2002</year>
          )
          <fpage>1803</fpage>
          -
          <lpage>1806</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>J.B. Friedlander</surname>
            ,
            <given-names>I. Shparlinski</given-names>
          </string-name>
          ,
          <article-title>On the Distribution of the Power Generator</article-title>
          , Math. Comp.
          <volume>70</volume>
          (
          <year>2001</year>
          )
          <fpage>1575</fpage>
          -
          <lpage>1589</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>D.</given-names>
            <surname>Gomez-Perez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gutierrez</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Shparlinski</surname>
          </string-name>
          , Exponential Sums with Dickson Polynomials,
          <source>Finite Fields Appl</source>
          .
          <volume>12</volume>
          (
          <year>2006</year>
          )
          <fpage>16</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gutierrez</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          Gomez-Perez,
          <article-title>Iterations of Multivariate Polynomials and Discrepancy of Pseudorandom Numbers, Appl</article-title>
          . Algebra,
          <string-name>
            <surname>Algebraic Algorithms</surname>
          </string-name>
          Error-Correcting
          <source>Codes, Lecture Notes in Comput. Sci</source>
          .
          <volume>2227</volume>
          (
          <year>2001</year>
          )
          <fpage>192</fpage>
          -
          <lpage>199</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>J.</given-names>
            <surname>Gutierrez</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Shparlinski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Winterhof</surname>
          </string-name>
          ,
          <article-title>On the Linear and Nonlinear Complexity Profile of Nonlinear Pseudorandom NumberGenerators</article-title>
          ,
          <source>IEEE Trans. Inform. Theory</source>
          ,
          <volume>49</volume>
          (
          <year>2003</year>
          )
          <fpage>60</fpage>
          -
          <lpage>64</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>K.</given-names>
            <surname>Gyarmati</surname>
          </string-name>
          ,
          <article-title>On a Family of Pseudorandom Binary Sequences, Period</article-title>
          . Math. Hungar.
          <volume>49</volume>
          (
          <year>2004</year>
          )
          <fpage>45</fpage>
          -
          <lpage>63</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10998-004- 0522-y
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>F.</given-names>
            <surname>Hess</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Shparlinski</surname>
          </string-name>
          ,
          <article-title>On the Linear Complexity and Multidimensional Distribution of Congruential Generators Over Elliptic Curves, Des</article-title>
          .
          <source>Codes Cryptogr</source>
          .
          <volume>35</volume>
          (
          <year>2005</year>
          )
          <fpage>111</fpage>
          -
          <lpage>117</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10623- 003-6153-0
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>D.R.</given-names>
            <surname>Kohel</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Shparlinski</surname>
          </string-name>
          , On Exponential Sums and
          <article-title>Group Generators for Elliptic Curves Over Finite Fields, Algorithmic Number Theory</article-title>
          ,
          <string-name>
            <surname>LNCS</surname>
          </string-name>
          ,
          <year>1838</year>
          (
          <year>2000</year>
          )
          <fpage>395</fpage>
          -
          <lpage>404</lpage>
          . doi:
          <volume>10</volume>
          .1007/10722028_
          <fpage>24</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>T.</given-names>
            <surname>Lange</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Shparlinski</surname>
          </string-name>
          ,
          <article-title>Certain Exponential Sums and Random Walks on Elliptic Curves, Canad</article-title>
          . J. Math.
          <volume>57</volume>
          (
          <year>2005</year>
          )
          <fpage>338</fpage>
          -
          <lpage>350</lpage>
          . doi:
          <volume>10</volume>
          .4153/CJM-2005
          <source>-015-8</source>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>W.</given-names>
            <surname>Meidl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Winterhof</surname>
          </string-name>
          ,
          <article-title>On the Linear Complexity Profile of Explicit Nonlinear Pseudorandom Numbers</article-title>
          , doi:10.1016/S0020-
          <volume>0190</volume>
          (
          <issue>02</issue>
          )
          <fpage>00335</fpage>
          -
          <lpage>6</lpage>
          Inform. Process. Lett.
          <volume>85</volume>
          (
          <year>2003</year>
          )
          <fpage>13</fpage>
          -
          <lpage>18</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>W.</given-names>
            <surname>Meidl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Winterhof</surname>
          </string-name>
          ,
          <article-title>On the Linear Complexity Profile of Some New Explicit Inversive Pseudorandom Numbers</article-title>
          , J. Complexity,
          <volume>20</volume>
          (
          <year>2004</year>
          )
          <fpage>350</fpage>
          -
          <lpage>355</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.jco.
          <year>2003</year>
          .
          <volume>08</volume>
          .017
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>W.</given-names>
            <surname>Meidl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Winterhof</surname>
          </string-name>
          , On the Autocorrelation of Cyclotomic Generators,
          <source>Finite Fields and Applications</source>
          , LNCS,
          <volume>2948</volume>
          (
          <year>2004</year>
          )
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -24633-
          <issue>6</issue>
          _
          <fpage>1</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>H.</given-names>
            <surname>Niederreiter</surname>
          </string-name>
          ,
          <article-title>Linear Complexity and Related Complexity Measures for Sequences, Progress in CryptologyINDOCRYPT 2003</article-title>
          , LNCS,
          <volume>2904</volume>
          (
          <year>2003</year>
          )
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -24582-
          <issue>7</issue>
          _
          <fpage>1</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>H.</given-names>
            <surname>Niederreiter</surname>
          </string-name>
          ,
          <article-title>Constructions of (t, m, s)- Nets and (t, s)-sequences</article-title>
          ,
          <source>Finite Fields Appl</source>
          .
          <volume>11</volume>
          (
          <year>2005</year>
          )
          <fpage>578</fpage>
          -
          <lpage>600</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.ffa.
          <year>2005</year>
          .
          <volume>01</volume>
          .001
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>H.</given-names>
            <surname>Niederreiter</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Shparlinski</surname>
          </string-name>
          ,
          <article-title>On the Distribution of Inversive Congruential Pseudorandom Numbers in Parts of the Period</article-title>
          , Math. Comp.,
          <volume>70</volume>
          (
          <year>2001</year>
          )
          <fpage>1569</fpage>
          -
          <lpage>1574</lpage>
          . doi:
          <volume>10</volume>
          .1090/S0025-5718-00-01273-4
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>H.</given-names>
            <surname>Niederreiter</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Shparlinski</surname>
          </string-name>
          ,
          <source>Recent Advances in the Theory of Nonlinear Pseudorandom Number Generators, Monte Carlo and quasi-Monte Carlo Methods</source>
          ,
          <year>2000</year>
          ,
          <fpage>86</fpage>
          -
          <lpage>102</lpage>
          (
          <year>2002</year>
          ). doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -56046-
          <issue>0</issue>
          _
          <fpage>6</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>H.</given-names>
            <surname>Niederreiter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Winterhof</surname>
          </string-name>
          , On the (
          <year>2006</year>
          )
          <fpage>285</fpage>
          -
          <lpage>289</lpage>
          . doi:
          <volume>10</volume>
          .1007/s00200-006
          <source>- Distribution of Some New Explicit 0009-6</source>
          Nonlinear Congruential Pseudorandom [46]
          <string-name>
            <given-names>D.</given-names>
            <surname>Kahrobaei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <surname>A NonNumbers</surname>
          </string-name>
          ,
          <article-title>Sequences and Their Applications Commutative Generalization of ElGamal SETA 2004</article-title>
          , LNCS,
          <volume>3486</volume>
          (
          <year>2005</year>
          )
          <fpage>266</fpage>
          -
          <lpage>274</lpage>
          . Key Exchange using Polycyclic Groups,
          <source>doi:10.1007/11423461_19 IEEE Globecom</source>
          <year>2006</year>
          , San Francisco, CA,
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          <source>[36] I. Shparlinski, On the Linear Complexity of USA</source>
          ,
          <year>2006</year>
          . doi:
          <volume>10</volume>
          .1109/GLOCOM.
          <year>2006</year>
          .
          <article-title>the Power Generator, Des</article-title>
          . Codes Cryptogr. [47]
          <string-name>
            <given-names>A.</given-names>
            <surname>Myasnikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Shpilrain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ushakov</surname>
          </string-name>
          ,
          <volume>23</volume>
          (
          <year>2001</year>
          )
          <fpage>5</fpage>
          -
          <lpage>10</lpage>
          . Group-based
          <string-name>
            <surname>Cryptography</surname>
          </string-name>
          , Birkhäuser doi:
          <volume>10</volume>
          .1023/A:1011264815860 Verlag,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <surname>I. Shparlinski</surname>
          </string-name>
          , Cryptographic Applications [48]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <article-title>New Directions of Modern of Analytic Number Theory</article-title>
          . Complexity Cryptography, CRC Press, Taylor &amp; Francis Lower Bounds and Pseudorandomness, PCS, Group,
          <year>2012</year>
          . doi:
          <volume>10</volume>
          .1201/b14302 22 (
          <year>2003</year>
          ). doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>0348</fpage>
          -8037-4 [49]
          <string-name>
            <given-names>G.</given-names>
            <surname>Maze</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Monico</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rosenthal</surname>
          </string-name>
          , Public
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>I.</given-names>
            <surname>Shparlinski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Winterhof</surname>
          </string-name>
          ,
          <source>On the Linear Key Cryptography Based on Semigroup Complexity of Bounded Integer Sequences Actions, Adv. Math. Commun</source>
          .
          <volume>1</volume>
          (
          <issue>4</issue>
          ) (
          <year>2007</year>
          )
          <article-title>Over Different Moduli, Inform</article-title>
          . Process.
          <volume>489</volume>
          -
          <fpage>507</fpage>
          . doi:
          <volume>10</volume>
          .3934/amc.
          <year>2007</year>
          .
          <volume>1</volume>
          .489 Lett.
          <volume>96</volume>
          (
          <year>2005</year>
          )
          <fpage>175</fpage>
          -
          <lpage>177</lpage>
          . [50]
          <string-name>
            <given-names>P.H.</given-names>
            <surname>Kropholler</surname>
          </string-name>
          , et al.,
          <source>Properties of Certain doi:10</source>
          .1016/j.ipl.
          <year>2005</year>
          .
          <volume>08</volume>
          .004 Semigroups and Their Potential as Platforms
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>A.</given-names>
            <surname>Topuzoğlu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Winterhof</surname>
          </string-name>
          ,
          <article-title>On the Linear for Cryptosystems</article-title>
          ,
          <source>Semigroup Forum 81 Complexity Profile of Nonlinear</source>
          (
          <year>2010</year>
          )
          <fpage>172</fpage>
          -
          <lpage>186</lpage>
          . doi:
          <volume>10</volume>
          .1007/S00233-010
          <source>- Congruential Pseudorandom Number 9248-8 Generators of Higher Orders, Appl. Algebra</source>
          [51]
          <string-name>
            <given-names>G.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Saini</surname>
          </string-name>
          , Novel Noncommutative Engrg.
          <source>Comm. Comput</source>
          ,
          <volume>16</volume>
          (
          <year>2005</year>
          )
          <fpage>219</fpage>
          -
          <lpage>228</lpage>
          . Cryptography Scheme Using Extra Special doi:
          <volume>10</volume>
          .1007/s00200-005-0181-0 Group, Secur. Commun. Netws. (
          <year>2017</year>
          ). doi:
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>O.</given-names>
            <surname>Pustovit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <source>A New Stream</source>
          <volume>10</volume>
          .1155/
          <year>2017</year>
          /9036382 Algorithms Generating Sensetive Digests of [52]
          <string-name>
            <given-names>V.</given-names>
            <surname>Roman</surname>
          </string-name>
          <article-title>'kov, A Nonlinear Decomposition Digital Documents</article-title>
          ,
          <source>Math. Modell. Econs. 3 Attack</source>
          , Groups Complex.
          <source>Cryptol</source>
          .
          <volume>8</volume>
          (
          <issue>2</issue>
          ) (
          <year>2019</year>
          )
          <fpage>18</fpage>
          -
          <lpage>33</lpage>
          . doi:
          <volume>10</volume>
          .15439/2021F80 (
          <year>2016</year>
          ),
          <fpage>197</fpage>
          -
          <lpage>207</lpage>
          . doi:
          <volume>10</volume>
          .1515/gcc-2016-
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>A.</given-names>
            <surname>Canteaut</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.X.</given-names>
            <surname>Standaert</surname>
          </string-name>
          ,
          <source>Advances in 0017 Cryptology - EUROCRYPT</source>
          <year>2021</year>
          , 40th An- [53]
          <string-name>
            <given-names>V.</given-names>
            <surname>Roman</surname>
          </string-name>
          <article-title>'kov, An Improved Version of The nual International Conference on the AAG Cryptographic Protocol, Groups Theoryand Applications of Cryptographic Complex</article-title>
          . Cryptol.
          <volume>11</volume>
          (
          <issue>1</issue>
          ) (
          <year>2019</year>
          )
          <fpage>35</fpage>
          -
          <lpage>42</lpage>
          . Techniques Zagreb, Croatia, October
          <volume>17</volume>
          -21, doi:10.1515/gcc-2019-2003
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -77870-5 [54]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ben-Zvi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kalka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Tsaban</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>F.</given-names>
            <surname>Lazebnik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.J.</given-names>
            <surname>Woldar</surname>
          </string-name>
          , A Cryptanalysis via Algebraic Span,
          <source>Annu. Int. New Series of Dense Graphs of High Girth, Cryptol. Conf</source>
          .
          <volume>1</volume>
          (
          <issue>10991</issue>
          ) (
          <year>2018</year>
          )
          <fpage>255</fpage>
          -
          <lpage>274</lpage>
          . Bull.
          <source>Amer. Math. Soc</source>
          .
          <volume>32</volume>
          (
          <issue>1</issue>
          ) (
          <year>1995</year>
          )
          <fpage>73</fpage>
          -
          <lpage>79</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -96884-
          <issue>1</issue>
          _9 doi:10.1090/s0273-0979-1995-
          <volume>00569-0</volume>
          [55]
          <string-name>
            <given-names>B.</given-names>
            <surname>Tsaban</surname>
          </string-name>
          , Polynomial-Time Solutions of
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Klisowski</surname>
          </string-name>
          ,
          <article-title>On Computational Problems in Noncommutative Cryptography with Noncommutative-Algebraic Cryptography</article-title>
          ,
          <source>Cubical Multivariate Maps of Predictable J. Cryptol</source>
          .
          <volume>28</volume>
          (
          <issue>3</issue>
          ) (
          <year>2015</year>
          )
          <fpage>601</fpage>
          -
          <lpage>622</lpage>
          . Density, Advs.
          <source>Intell. Systs. Computing doi:10.1007/s00145-013-9170-9</source>
          (
          <issue>AISC</issue>
          )
          <volume>998</volume>
          (
          <year>2019</year>
          )
          <fpage>654</fpage>
          -
          <lpage>674</lpage>
          . [56]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <source>On The Families of Stable doi:10.1007/978-3-030-22868-2_47 Transformations of Large Order and Their</source>
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>D.N.</given-names>
            <surname>Moldovyan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.A.</given-names>
            <surname>Moldovyan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A New</given-names>
            <surname>Cryptographical</surname>
          </string-name>
          <string-name>
            <surname>Applications</surname>
          </string-name>
          , Tatra Mt.
          <article-title>Hard Problem over Non-commutative Finite Math</article-title>
          . Publ.,
          <volume>70</volume>
          (
          <year>2017</year>
          ),
          <fpage>107</fpage>
          -
          <lpage>117</lpage>
          . Groups for Cryptographic Protocols, doi:10.1515/tmmp-2017-0021
          <string-name>
            <given-names>Computer</given-names>
            <surname>Netw</surname>
          </string-name>
          . Secur. (
          <year>2010</year>
          )
          <fpage>183</fpage>
          -
          <lpage>194</lpage>
          . [57]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Romanczuk-Polubiec</surname>
          </string-name>
          , A. doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -14706-7_14 Wroblewska, Expanding Graph of the
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>V.</given-names>
            <surname>Shpilrain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ushakov</surname>
          </string-name>
          ,
          <article-title>The Conjugacy Extremal Graph Theory and Expanded Search Problem in Public Key Platforms of Post-Quantum Cryptography, Cryptography: Unnecessary and Insufficient</article-title>
          ,
          <source>Anns Comput. Sci. Inf</source>
          . Systs.
          <volume>19</volume>
          (
          <year>2019</year>
          )
          <fpage>41</fpage>
          -
          <lpage>Appl</lpage>
          . Algebra Eng.
          <source>Commun. Comput. 17 46.</source>
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [58]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <source>On Extremal Graph Theory and Symbolic Computations, Reports of the National Academy of Sci. Ukraine</source>
          <volume>2</volume>
          (
          <issue>2</issue>
          ) (
          <year>2013</year>
          )
          <fpage>42</fpage>
          -
          <lpage>49</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [59]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          , On a Group Theoretical Constructions of Expanding Graphs,
          <source>J. Algebra Discret. Maths</source>
          .
          <volume>3</volume>
          (
          <year>2003</year>
          )
          <fpage>102</fpage>
          -
          <lpage>109</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [60]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          , U. Romanczuk,
          <source>On Extremal Graph Theory, Explicit Algebraic Constructions of Extremal Graphs and Corresponding Turing Encryption Machines, Artif. Intell. Evolut. Computing Metaheuristics</source>
          <volume>427</volume>
          (
          <year>2013</year>
          )
          <fpage>257</fpage>
          -
          <lpage>285</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -29694-9_
          <fpage>11</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [61]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <source>Coordinatisation of Trees and their Quotients</source>
          ,
          <source>Voronoj's Impact on Modern Science</source>
          , Kyiv, Institute of Mathematics,
          <volume>2</volume>
          (
          <year>1998</year>
          )
          <fpage>125</fpage>
          -
          <lpage>152</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [62]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          , CRYPTIM:
          <article-title>Graphs as Tools for Symmetric Encryption</article-title>
          ,
          <source>Int. Symp. Appl. Algebra Algebraic Algorithms ErrorCorrect. Codes</source>
          <volume>2227</volume>
          (
          <year>2001</year>
          )
          <fpage>278</fpage>
          -
          <lpage>286</lpage>
          . doi:
          <volume>10</volume>
          .1007/3-540-45624-4_
          <fpage>29</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [63]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <article-title>On the Extremal Graph Theory for Directed Graphs and Its Cryptographical Applications, Codin</article-title>
          .
          <source>Theory Cryptogr</source>
          .
          <volume>3</volume>
          (
          <year>2007</year>
          )
          <fpage>181</fpage>
          -
          <lpage>200</lpage>
          . doi:
          <volume>10</volume>
          .1142/9789812772022_
          <fpage>0012</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [64]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <article-title>Graphs in Terms of Algebraic Geometry, Symbolic Computations and Secure Communications in Post-Quantum world</article-title>
          ,
          <source>UMCS Editorial House, Lublin</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>