<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Classic, Quantum, and Post-Quantum Cryptography, August</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>On Algebraic Graphs of Large Girth and New Families of Message Authentication Codes⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vasyl Ustimenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Pustovit</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Telecommunications and Global Information Space, NAS of Ukraine</institution>
          ,
          <addr-line>13 Chokolivsky ave., 02186 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Royal Holloway University of London, United Kingdom</institution>
          ,
          <addr-line>Egham Hill, TW20 0EX Egham</addr-line>
          ,
          <country country="UK">United Kingdom</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>5</volume>
      <issue>2025</issue>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Several new families of graph-based key-dependent message authentication codes are proposed. The method allows for the generation of sensitive digests of electronic documents. Computer simulation justifies a high level of corresponding avalanche effect. Algorithms are based on walks on special algebraic graphs defined by equations over the arithmetic ring Zq, q = 2r, r ≥ 8. The cryptographic stability of proposed key-dependent message authentication codes is connected with a hard algebraic problem in investigating the systems of algebraic equalities in n variables of linear degree cn for some positive constant c. Growth of n increases the cryptographic stability. If the file is presented in the form of word in alphabet Zq of length n and length of the walk in the graph is fixed then the execution is a linear function of size O(n). Proposed algorithms can work with data in the form of texts, audio and video files, and files with various extensions such as .avi, .tif, .pdf, etc. The speed for constant m is linearly dependent on variable n. Growth of n increases the cryptographic stability. Algorithms can generate a digest of a prescribed size for a potentially infinite digital document.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;key dependent</kwd>
        <kwd>message authentication codes</kwd>
        <kwd>highly nonlinear multivariate cryptography</kwd>
        <kwd>graph-based cryptography</kwd>
        <kwd>algebraic graphs of large girth</kwd>
        <kwd>symbolic computations</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>A simplified model of the global information space can be imagined as a large, time-growing
network of registered virtual users (individuals or institutions) who exchange information and can
store it in electronic repositories located in the network or isolated from it. The size of files for
exchange (electronic documents) tends to increase. An important category of the information space
is the trust in documents. Users can use a symmetric algorithm with a private key to encrypt
documents and a key exchange protocol to maintain the security of the encoding procedure.
Certified public key algorithms can also be used to change the key. These methods ensure the
security of the exchange channels.</p>
      <p>It is easy to see that even using reliable encryption tools does not ensure complete trust in
documents. The above justifies the importance and relevance of the following questions. Has the
original document already been damaged? Hash function generation technologies are used to
answer these questions. A hash function is needed to generate a compensated form of the original
document. Note that the general hash function does not require a key or password.</p>
      <p>For document verification and authentication tasks, so-called key hash functions (key hash
functions, message authentication codes, or MACs) are required that are password-dependent.</p>
      <p>In this paper, we propose new graph-based fast algorithms for creating digests of electronic files
to detect cyberattacks, computer viruses, or other corruptions and verify data integrity. The
cryptographic stability of several graph-based key-dependent hash functions is related to studying
the navigation problem of finding the path between two graph vertices. In the case of the Cayley
graph of the group G this is about decomposing the group element into a composition of known
generators. Research on the message authentication codes based on Cayley graphs started from the
case of Ramanujan graphs constructed by Lubotzky-Philips-Sarnak and Margulis [1, 2] and Pizer
[3]. Charles, Lauter, and Goren [4] gave a construction of a hash function based on these graphs.
This work was motivated by the successful use of Cayley Ramanujan graphs to construct
lowdensity parity Check codes for satellite communications. Petit, Lauter, and Quisquater [5], Tillich
and Zémor [6] investigated the properties of Message Authentication Codes. These results gave a
full cryptanalysis of the scheme. Carvalho Pinto and Petit [7] also developed an improved
pathfinding algorithm for these graphs.</p>
      <p>Cayley-Ramanujan graphs form a family of graphs of large girth. Another family CD(n, q) of
graphs with the fast growth of girth was suggested by Lazebnik, Ustimenko, and Woldar [ 8] (see
also [9] where graphs D(n, q) with connected components isomorphic to CD(n, q) were introduced).
Guinand and Lodge [10, 11] and other researchers used corresponding graphs to construct LDPC
codes. Accordingly, McKay and Postol CD(n, q) based graphs have better properties than Cayley
graphs of large girth [12].</p>
      <p>The first message authentication codes based on CD(n, q) graphs were proposed by Polak and
Zhupa [13] and Ustimenko and Pustovit [14]. In fact, the last paper uses a more general family of
graphs CD(n, K) defined over an arbitrary commutative ring K. If K = Fq, then CD(n, K) = CD(n, q)
and D(n, K) = D(n, q).</p>
      <p>Ustimenko [15] proves that the girth of D(n, K) is at least n + 5 if K is an integral domain.</p>
      <p>Message authentication codes of [14] are defined in terms of infinite graphs D(n, K[x1, x2, …, xm])
where K is a finite commutative ring. The cryptographical stability of these codes rests not only on
the complexity of the corresponding navigation problem but also on the complexity of the general
problem of solving a nonlinear system of algebraic equations.</p>
      <p>In this paper, the authors present a family of new robust MACs based on several families of
algebraic graphs, such as generalised Wenger graphs W(n, K), D(n, K), A(n, K), and other graphs.</p>
      <p>All graphs under consideration are so-called linguistic graphs of type (1, 1, n – 1) (see [15] and
further references) introduced as bipartite graphs with partition sets isomorphic to affine spaces Kn
over a commutative ring K with unity for which the incidence relation triangular equations give me.
In fact points and lines of the linguistic graph are tuples of kind (x) = (x1, x2, …, xn) and [y] = [y1, y2,
…, yn] and (x) and [y] are incident if and only if aixi – bixi = fi(x1, x2, …, xi – 1, y1, y2, …, yi – 1), i = 2, 3, …,
n where ai and bi are elements of multiplicative group K* of the K and fi ϵ K[x1, x2, …, xi – 1, y1, y2, …,
yi – 1]. The first coordinates ϱ(x) = x1 and ϱ(y) = y1 define the colours of the point and line. The path
in the graph formed by distinct vertices is the walk v0Iv1Iv2…vk – 1Ivk such that the colours of all
points and lines are different.</p>
      <p>If Fm(K) is a family of linguistic graphs, then the growth of m to infinity defines the projective
limit F(K).</p>
      <p>If Fm(K) is one of the families of graphs investigated in [16], then the walk v0Iv1Iv2…vk – 1Ivk of F(K)
such that ϱ(vi)-ϱ(vi + 2) ϵ K* for I = 0, 1, …, k – 2 is the path.. Cayley-Ramanujan graphs form a family
of graphs of large girth. Another family CD(n, q) of graphs with the fast growth of girth was
suggested by Lazebnik, Ustimenko, and Woldar [8] (see also [9] where graphs D(n, q) with
connected components isomorphic to CD(n, q) were introduced). Guinand and Lodge used
corresponding graphs.</p>
      <p>In this paper, we select the case when K = Zq, q = 2m, m ≥ 2, and the aforementioned linguistic
graphs to define new families of message authentication codes. In Section 1, we introduce an
algorithm for converting an arbitrary word (α1 α2, …, αn) written in the alphabet Zq into the digest
(d1, d2, …, dk), which is the word of length k, k &lt; n. These algorithms are defined in terms of
arbitrary linguistic graphs. The complexity estimates are given in the Jordan-Gauss graphs defined
in [16]. Section 2 is dedicated to the requirements on the cryptographical stability of message
authentication codes. We discuss the general complexity of investigating a nonlinear system of
equations, which justifies the security of the presented MACs. Section 3 introduces our algorithms
regarding arbitrary linguistic graphs of type (1, 1, n – 1). Section 4 describes our selected algebraic
graphs defined by the sparce quadratic system of equations and discusses their complexity and
parameters of the corresponding algebraic systems of equations. Section 5 is dedicated to
implementing MACs described in the previous section. Section 6 contains conclusive remarks.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Requirements for digesting</title>
      <p>The cryptographically stable hash function f must provide the practical impossibility of selecting a
pair of links x and z with the same hash function value. The digest of a document created with a
key-dependent hash function (MAC) uses the HMAC symbol. When users want to exchange
correspondence secretly, verifying the author of the letter and the absence of changes when
forwarding, they choose a shared MAC. Additionally, they use a standard symmetric encryption
scheme.</p>
      <p>In addition to cryptographical stability, the execution speed and a high indicator of avalanche
effect are important. The avalanche effect can be measured in the following way. The HMAC of the
generated file has to be computed. After this step, a chosen character of the original file has to be
changed to another symbol, and HMAC for the new file has to be computed.</p>
      <p>Finally, a comparison of the characters of two HMACs has to be made, and the percentage of
changed characters has to be computed. For practical usage of HMAC, it is necessary to show that
a change of an arbitrarily used character leads to a change of at least 40% of bits independently of
the size of the tested files.</p>
      <p>The introduced approach of using walks on algebraic graphs defined over a finite commutative
ring K is helpful for the development of stream ciphers of Symmetric Cryptography (see, for
instance, [17], [18], and further references) and constructions of HMACs. Other applications of
graph theory to Symmetric Cryptography are considered in [19]. The method of generation of
nonlinear transformations of free modules over commutative rings described in terms of special
graphs defined by algebraic equations (so-called linguistic graphs) can be used in Non-commutative
Cryptography instead of methods of generators and equations [20].</p>
      <p>Studies of message authentication codes and НMACs are a hot topic. A complete list of all
published papers within this direction is impossible; we only refer to some recent papers [21–29].</p>
      <p>Recall that non-commutative cryptography is an active field of cryptology that explores
cryptographic primitives and systems based on algebraic structures such as groups, semigroups,
and non-commutative rings.</p>
      <p>One of the earliest applications of non-commutative algebraic structure for cryptographic
purposes was using groups to develop cryptographic protocols.</p>
      <p>Noteworthy that arbitrary hash functions such as MD5 or SHA1 can be used to compose
HMACs corresponding to MD5 and SHA-1 message authentication codes, which are known as
HMAC-MD5 and HMAC-SHA-1, respectively. HMAC’s cryptographic performance depends on the
cryptographic performance of the underlying hash function, the size of its hash output, and the size
and quality of the key.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Description of HMACs based on linguistic graphs defined over Zq,</title>
      <p>q = 2m
Let us assume that q = 2m and nI is a bipartite linguistic graph with the partition sets formed by
points (x) = (x1, x2, …, xn), xi ϵ Zq and lines [y1, y2, …, yn], yi ϵ Zq. Recall that (x)nI[y] if and only if the
following equations hold</p>
      <p>a2x2 – b2x2=f2(x1, y1),
a3x3 – b3x3=f3(x1, x2, y1, y2),</p>
      <p>…
anxn – bnxn = fi(x1, x2, …, xn – 1, y1, y2, …, yn – 1).</p>
      <p>We define the operator Na(v) of taking the neighbour of colour a via the following rule. If vertex
v is the point (p) then Na(p) is the neighbouring line of this point with the colour a, i. e line [l] = [a,
l2, …, ln] where li, i = 2, 3, …, n are defined recurrently from the equations a2p2 – b2l2 = p1a,
a3p3 – b3l3 = f3(p1, p2, l1, l2), …, aipi – bili = fi(p1, p2, …, pi – 1, l1, l2, …, li – 1). If vertex v is the line [l] then
Na(l) is the neighbouring point of the line with the colour a, i.e., point (p) = (a, p2, …, pn) where pi,
i = 2, 3, …, n are defined recurrently from the equations a2p2 – b2l2 = al1, a3p3 – b3l3 = f3(p1, p2, l1, l2), …,
aipi – bili = fi(p1, p2, …, pi – 1, l1, l2, …, li – 1).</p>
      <p>In the following algorithms, we assume that the commutative ring K = Zq and the graph nI(K)
internal parameters are among the input data. So, the operations of addition and multiplication of
the ring are given by the loaded addition and multiplication tables. So we have embedded functions
x + y and xꞏy where x and y are taken from the set of residues mod q. We will use another
embedded power function xy, where x is from the domain of all odd residues and y is the residue
modulo 2m – 1, which is the order of the multiplicative group K*. Parameters give the graph nI(K) ai,
bi, i = 2, 3, …, n, and a list of polynomials fi is given in their standard forms, i.e., lists of monomial
terms of fi, i = 2, 3, …, n shown in the lexicographical order. The data described above is public. The
input tuple of our algorithm is of the kind (x1, x2, …, xn), xi ϵ K = Zq, q = 28s, s ≥ 1. So we can treat
each xi as a tuple (z1, z2, …, zs) from Zb, b = 256 corresponding to the residue z1 + z2b + … + zsbs – 1
from Zq, and use the standard one-to-one correspondence between elements of Zb and ASCII codes
of binary alphabet. So we can partition the text in binary alphabet into words of length s and treat
each word as an element of the ring K = Zq.</p>
      <p>
        The passive password of our secret key of our key dependent message authentication codes is
the tuples (α2, α3, …, αn), (γ2, γ3, …, γn) where αj ϵ (Zq)* and (λ2, λ3, …, λn) where λi are even residues
together with the tuple ((a(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), a(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), …, a(n)) formed by elements of a(j) ϵ {1, 2, …, 28s – 1 – 1}. We refer
to this list of parameters as a passive password. We additionally use the format parameter k = O(nt),
k &lt; n, where 0 &lt; t ≤ 1.
      </p>
      <p>
        The active password is formed by depth parameter m of size O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) together with tuples (β(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), β(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ),
…, β(m)) and (μ(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), μ(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), …, μ(m)) from ((Zq)*)m.
      </p>
      <p>
        We consider bijective transformations L of kind x1 → x1 + α2x2 + … + anxn, xj → xj, j = 2, 3, …, n
and the value of multivariate polynomial Q(x1, x2, …, xn) = x1(λ2x2 + γ2)a(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )(λ3x3 + γ3)a(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )…
(λnxn + γn)a(n) = Q.
      </p>
      <p>To control the speed of computation of Q we assume that ‘’almost all’’ parameters a(i), I  ≥ 2,
coincide with 1, i.e., the sum of parameters a(i) which are distinct from 1 is the selected constant d.</p>
      <p>HMAC algorithm 1 (two versions)</p>
      <p>Let (x1, x2, …, xn) be the intermediate point of the graph. We assume that it is the input of the
algorithm.</p>
      <p>
        1. Compute y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = L(x) = (a, x2, x3, …, xn).
      </p>
      <p>
        Compute NQ(y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )) = z(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = [c, y2, y3, …, yn].
2. y(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = Na + β(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )(z(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )).
      </p>
      <p>
        z(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = Nc + μ(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )(y(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )).
3. y(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) = Nc + β(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) + β(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )(z(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )).
      </p>
      <p>
        z(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) = Nc + μ(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) + μ(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )(y(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )).
      </p>
      <p>
        We continue this process with m-steps to get y(m) = Na + β(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) + β(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) + … + β(m – 1))(z(m – 1)) and
z(m) = Nc + μ(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) + μ(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) + … + β(m – 1)(y(m)).
      </p>
      <p>We have two versions of the algorithm via selection of y(m) or z(m) as the intermediate output
v = (v1, v2, …, vn).</p>
      <p>Finally, we select parameter k = O(nt), k &lt; n, where 0 &lt; t ≤ 1, and announce that (vn – k, vn – k + 1,
vn – k + 2, …, vn) is the output of the algorithm.</p>
      <p>HMAC algorithm 2.</p>
      <p>
        The first step is the same as the first computation of the previous algorithm. So we get y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and
y(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ). In each of the following steps, we permute two colours of the vertices.
      </p>
      <p>
        2. y(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = Nc + μ(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )(z(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), z(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = Na + β(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )(y(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )).
3. y(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) = Nc + μ(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) + μ(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )(z(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )), z(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) = Na + β(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) + β(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )(y(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )).
z(m) = Na + β(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) + β(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) + … + β(m – 1)(y(m)).
      </p>
      <p>Similarly, we have two versions of the algorithm via the selection of y(m) or z(m) as the
intermediate output v = (v1, v2, …, vn). Finally, we select parameter k = O(nt), k &lt; n, where 0 &lt; t ≤ 1,
and announce that (vn – k, vn – k + 1, vn – k + 2, …, vn) is the output of the algorithm.</p>
      <p>The multivariate maps (x1, x2, …, xn – k) → (vn – k(x1, x2, …, xn), vn – k + 1(x1, x2, …, xn), …, vn(x1, x2, …,
xn)) for the computation of the outputs in the two algorithms presented above have different
degrees and densities.</p>
      <p>HMAC algorithm 3</p>
      <p>
        This algorithms will use the map Q(x1, x2, …, xn) of Kn on Kn of kind x1 → x1(λ2x2 + γ2)a(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )(λ3
x3 + γ3)a(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )…(λnxn + γn)a(n), xj → xj and linear function M = x1 + α2x2 + … + αnxn.
      </p>
      <p>
        We take (x) = (x1, x2, …, xn) and compute Q(x) = (a, x2, x3, …, xn) = y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), parameter M(x1, x2, …,
xn) = c and z(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = Nc(y(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )).
      </p>
      <p>
        Then we use recursive procedures of the MAC Algorithm 1 to compute recurrently y(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), z(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ),
y(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), z(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), …, y(m), z(m). For the selected parameter k, we take k last coordinates of y(m) or z(m) and
use this tuple as the output.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. On the selected graphs for the implementation</title>
      <p>
        a. General Jordan-Gauss graphs
Accordingly to [16], we refer to the linguistic graph nI(K) given by equations of kind (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) as the
Jordan-Gauss graph in the case when
      </p>
      <p>
        f2 = a2(
        <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
        )x1y1,
f3 = a3(
        <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
        )x1y1 + a3(
        <xref ref-type="bibr" rid="ref1 ref3">1, 3</xref>
        )x1y2 + a3(
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        )x2y2,
f4 = a4(
        <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
        )x1y1 + a4(
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        )x1y2 + a4(
        <xref ref-type="bibr" rid="ref1 ref3">1, 3</xref>
        )x1y3 + a4(
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        )x2y2 + a4(
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        )x2y3 + a4(
        <xref ref-type="bibr" rid="ref3 ref3">3, 3</xref>
        )x3y3,
…
fn = an(
        <xref ref-type="bibr" rid="ref1 ref1">1, 1</xref>
        )x1y1 + an(
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        )x1y2 + … + an(1, n – 1)x1yn – 1 + an(
        <xref ref-type="bibr" rid="ref2 ref2">2, 2</xref>
        )x2y2 + an(
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        )x2y3 +
      </p>
      <p>+ an(2, n – 1)x2yn – 1+ + ...+ + an(n – 1, n – 1)xn – 1yn – 1.</p>
      <p>We refer to the graph as a dense Jordan-Gauss if all coefficients ai(k, l) as above are different
from zero. If nI(K) is a dense Jordan-Gauss graph, we can keep it secret by adding the coefficients of
the graph equations to the passive password. The theoretical complexity of the presented above
algorithms is O(n2).
b. Special Jordan-Gauss graphs
We select for the implementation several well-known sparse Jordan-Gauss graphs for which the
number of nonzero coefficients ai(k, l) is O(n).</p>
      <p>Example 4.2.1. Generalised Wenger graph.</p>
      <p>This is a Jordan-Gauss graph with partition its isomorphic to Kn, such that point (x1, x2, …, xn) is
incident to line [y1, y2, …, yn] if and only if the following equations hold
x2 – y2 = x1y1,
x3 – y3 = x1y2,</p>
      <p>…
xn – yn = x1yn – 1.</p>
      <p>Wenger introduced this family of graphs in [30] for the case of K = Zp where p is prime.
Example 4.2.2.</p>
      <p>
        Let K stand for an arbitrary commutative ring with unity. We consider the graph D(K) with
points and lines which are infinite tuples over K of kind (p) = (p1, p2, …, pi, pi + 1, …), [l] = [l1, l2, …, li,
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
li + 1, …] with the following incidence relations. The point (p) is incident to line [l] if the following
equation holds.
      </p>
      <p>Graphs D(n, K), n ≥ 2, were introduced in [15]. In fact, they are homomorphic images of D(K)
under a homomorphism sending (p) into (p1, p2, …, pn) and [l] into [l1, l2, …, ln]. So the incidence
Jordan-Gauss graph D(n, K) is defined by the first n – 1 equations in the list presented above.</p>
      <p>The graph G’s girth g(G) is the size of its minimal cycle. The forest is the graph without a cycle.
The connected forest is called the tree [31]. If K is an integrity domain, i.e., K does not contain zero
divisors, then the girth D(n, K) of is at least n + 5 [15]. These facts were established in [9] for the
case of finite fields.</p>
      <p>Example 4.2.3.</p>
      <p>Infinite Jordan-Gauss graph A(K) with points (p) = (p1, p2, …, pi, pi + 1, …) and lines [l] = [l1, l2, …, li,
li + 1, …] with coordinates from commutative ring K is defined by equations</p>
      <p>Graphs A(n, K), n ≥ 2 introduced in [15] are homomorphic images of A(K) under a
homomorphism sending (p) into (p1, p2, …,pn) and [l] into [l1, l2,…, ln]. So the incidence of
JordanGauss graph A(n, K) is defined by the first n – 1 equations presented above.</p>
      <p>If K is an integrity domain, then A(K) is the forest (see [16] and further references), the girth of
A(n, K) is ≥ [(n + 2) / 2].</p>
      <p>We can see that the quadratic monomial term on the right-hand side of the equations uniquely
defines each equation of D(K). Let D be the set of monomial terms of the equation of D(K), and A be
the set of monomial terms of the A(K) equations. Note that the deletion of equations of D(K) with
monomial terms from D – A, together with corresponding equations, defines the homomorphism of
the forest D(K) onto A(K).</p>
      <p>Example 4.2.4</p>
      <p>
        The equations of the graph D(K) and corresponding quadratic monomial terms are ordered
accordingly to the list (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ). Let rB(K) be the homomorphic image of D(K) obtained by the deletion of
all equations with the number &gt; r which contain the monomials from D-A. Let rB(n, K), n &gt; r + 1 be
the graph with partition sets isomorphic to Kn defined via the first n – 1 equations of rB(K) (see [16]
and further references).
      </p>
      <p>In the case of Examples 4.2.1–4.2.4, the complexity of the generating procedure of the message
authentication codes is O(n).</p>
      <p>
        In cases 4.2.1–4.2.3, we assume that the graphs are known to the public. In the case of the graph
of Example 4.2.4, we can add the parameter n to the passive password.
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Comments on the implementation</title>
      <p>
        We investigate our algorithms in the commutative ring Z256, which is the same size as the binary
alphabet. We select the cases of sparse graphs described in Examples 4.2.1–4.2.4 for the
implementation. We choose the parameters of the passive password as follows. Only O(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) values of
kind αi, βi, and a(j) differ from 1, and only a selected finite number of λi differ from 2. The passive
password remains the same during our computer simulation.
      </p>
      <p>We refer to d = 2m as the length of the walk. In the cases of 4.2.2–4.2.4, the change of active
password leads to the shift in intermediate output v = (v1, v2, …, vn). The walk’s computation speed
is the same in all cases 4.2.1–4.2.4 because Jordan-Gauss graphs have equations with the single
quadratic monomial terms in each equation. Note that the time execution does not depend on
parameter k, which defines the digest size.</p>
      <p>Computer simulations demonstrate a high level of the avalanche effect. We can see that a single
change of the character of the initial file or a single shift in the character of the active password
leads to a change of 98% of the characters of the output. Not that this is essentially better than in
the case of HMAC [32] when the change of characters of the initial file leads to the change of 47-50
characters of the output.</p>
      <p>Our software is written in C++; therefore, it is portable and runs on many platforms, such as
Unix/Windows. To evaluate our algorithm’s performance, we use files of different sizes. We
measure the time (Fig. 1) needed to produce the digest in milliseconds. And the file size of files in
kilobytes for passwords of length d.
We use an average PC with a Pentium 3.00 GHz, 2GB of RAM, and Windows 7. The following
diagram presents the time of the algorithm’s execution in the case of graphs 4.2.2. on in the case of
graphs 4.2.2.</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>The paper proposes new fast graph-based algorithms for creating sensitive digests of electronic
files to detect cyberattacks, computer viruses, or other damages and check data integrity. These
tools can be used to defend a virtual organization and audit all files after a registered intervention.
Cryptographic stability of new key-dependent hash functions is associated with complex algebraic
problems, such as the study of systems of algebraic equations of a considerable degree and the
decomposition of a nonlinear transformation into the composition of given generators. These facts
justify resistance of digests against adversary attacks with the use of algorithms in terms of a
Turing machine or the theory of Quantum Computation.</p>
      <p>Algorithms of digest generation use the idea of presentation of files in the form of sequences
(words) of elements of the arithmetical ring modulo 2m. The presented families of graphs form
sequences that define the projective limit of finite graphs given by equations.</p>
      <p>Affine transformations and polynomial maps of high degree are used to hide the transformation
induced by the walk on the graph. This scheme is new,</p>
      <p>Implemented according to this scheme, a family of fast algorithms was investigated via
computer simulations on large real data sets. Changing a single document character in the binary
alphabet causes the change of most characters of the produced digest (≥98%). This property and the
evaluation of the time execution of software programs justify the potential of practical usage of the
implemented algorithm for cybersecurity tasks.</p>
      <p>Declaration on Generative AI
While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Lubotzky</surname>
          </string-name>
          ,
          <string-name>
            <surname>R.</surname>
          </string-name>
           Phillips,
          <string-name>
            <surname>P.</surname>
          </string-name>
           Sarnak, Ramanujan graphs,
          <source>Combinatorica</source>
          <volume>8</volume>
          (
          <issue>3</issue>
          ) (
          <year>1988</year>
          )
          <fpage>261</fpage>
          -
          <lpage>277</lpage>
          . doi:
          <volume>10</volume>
          .1007/BF02126799
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>G.</surname>
          </string-name>
           
          <article-title>Margulis, Explicit constructions of graphs without short cycles and low density codes</article-title>
          .
          <source>Combinatorica</source>
          <volume>2</volume>
          (
          <year>1982</year>
          )
          <fpage>71</fpage>
          -
          <lpage>78</lpage>
          . doi:
          <volume>10</volume>
          .1007/BF02579283
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A. K.</given-names>
             
            <surname>Pizer</surname>
          </string-name>
          ,
          <article-title>Ramanujan graphs and Hecke operators</article-title>
          .
          <source>Bull. Amer. Math. Soc</source>
          .
          <volume>23</volume>
          (
          <issue>1</issue>
          ) (
          <year>1990</year>
          )
          <fpage>127</fpage>
          -
          <lpage>137</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D. X.</given-names>
             
            <surname>Charles</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
             E. 
            <surname>Lauter</surname>
          </string-name>
          , E. Z. Goren,
          <article-title>Cryptographic hash functions from expander graphs</article-title>
          ,
          <source>J. Cryptol</source>
          .
          <volume>22</volume>
          (
          <issue>1</issue>
          ) (
          <year>2009</year>
          )
          <fpage>93</fpage>
          -
          <lpage>113</lpage>
          . doi:
          <volume>10</volume>
          .1007/s00145-007-9002-x
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C.</given-names>
             
            <surname>Petit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
             
            <surname>Lauter</surname>
          </string-name>
          , J.-J. Quisquater,
          <article-title>Full cryptanalysis of LPS and Morgenstern hash functions</article-title>
          ,
          <source>in: Security Cryptography Networks</source>
          ,
          <year>2008</year>
          ,
          <fpage>263</fpage>
          -
          <lpage>277</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -85855-3_
          <fpage>18</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>J.-P.</surname>
          </string-name>
           Tillich,
          <string-name>
            <surname>G.</surname>
          </string-name>
           
          <article-title>Zémor, Collisions for the LPS expander graph hash function</article-title>
          ,
          <source>in: Advances in Cryptology (EUROCRYPT)</source>
          ,
          <volume>4965</volume>
          ,
          <year>2008</year>
          ,
          <fpage>254</fpage>
          -
          <lpage>269</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -78967-3_
          <fpage>15</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>E.</surname>
          </string-name>
           Carvalho Pinto,
          <string-name>
            <given-names>C.</given-names>
             
            <surname>Petit</surname>
          </string-name>
          ,
          <article-title>Better path-finding algorithms in LPS Ramanujan graphs</article-title>
          ,
          <source>J. Math. Cryptol</source>
          .
          <volume>12</volume>
          (
          <issue>4</issue>
          ) (
          <year>2018</year>
          )
          <fpage>191</fpage>
          -
          <lpage>202</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>F.</given-names>
             
            <surname>Lazebnik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
             J. 
            <surname>Woldar</surname>
          </string-name>
          ,
          <article-title>A new series of dense graphs of high girth</article-title>
          ,
          <source>Bull. Amer. Math. Soc</source>
          .
          <volume>32</volume>
          (
          <issue>1</issue>
          ) (
          <year>1995</year>
          )
          <fpage>73</fpage>
          -
          <lpage>79</lpage>
          . doi:
          <volume>10</volume>
          .1090/S0273-0979-1995-00569-0
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>F.</given-names>
             
            <surname>Lazebnik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <article-title>Some algebraic constructions of dense graphs of large girth and of large size</article-title>
          ,
          <source>in: Discrete Mathematics and Theoretical Computer Science (DIMACS)</source>
          ,
          <volume>10</volume>
          ,
          <year>1993</year>
          ,
          <fpage>75</fpage>
          -
          <lpage>93</lpage>
          . doi:
          <volume>10</volume>
          .1090/dimacs/010/07
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P.</given-names>
             
            <surname>Guinand</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
           Lodge,
          <article-title>Tanner type codes arising from large girth graphs</article-title>
          ,
          <source>in: 1997 Canadian Workshop on Information Theory (CWIT)</source>
          ,
          <year>1997</year>
          ,
          <fpage>5</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>P.</given-names>
             
            <surname>Guinand</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
           Lodge,
          <article-title>Graph theoretic construction of generalized product codes</article-title>
          ,
          <source>in: 1997 IEEE Int. Symposium on Information Theory (ISIT)</source>
          ,
          <year>1997</year>
          ,
          <volume>111</volume>
          . doi:
          <volume>10</volume>
          .1109/ISIT.
          <year>1997</year>
          .613026
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
             MacKay, M. 
            <surname>Postol</surname>
          </string-name>
          ,
          <article-title>Weakness of Margulis and Ramanujan margulis low dencity paritycheck codes</article-title>
          ,
          <source>Electron. Notes Theor. Comput. Sci</source>
          .
          <volume>74</volume>
          (
          <year>2003</year>
          )
          <fpage>97</fpage>
          -
          <lpage>104</lpage>
          . doi:
          <volume>10</volume>
          .1016/S1571-
          <volume>0661</volume>
          (
          <issue>04</issue>
          )
          <fpage>80768</fpage>
          -
          <lpage>0</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Polak</surname>
          </string-name>
          ,
          <string-name>
            <surname>E.</surname>
          </string-name>
           Zhupa,
          <article-title>Keyed hash function from large girth expander graphs</article-title>
          ,
          <source>Albanian J. Math. 16(1)</source>
          (
          <year>2022</year>
          )
          <fpage>25</fpage>
          -
          <lpage>39</lpage>
          . doi:
          <volume>10</volume>
          .51286/albjm/1656414764
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Pustovit</surname>
          </string-name>
          ,
          <article-title>On new stream algorithms generating sensitive digests of computer files</article-title>
          ,
          <source>in: Annals of Computer Science and Information Systems, 16th Conference on Computer Science and Intelligence Systems</source>
          ,
          <volume>26</volume>
          ,
          <year>2021</year>
          ,
          <fpage>117</fpage>
          -
          <lpage>121</lpage>
          . doi:
          <volume>10</volume>
          .15439/2021f80
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <article-title>On linguistic dynamical systems, families of graphs of large girth, and cryptography</article-title>
          ,
          <source>J. Math. Sci</source>
          .
          <volume>140</volume>
          (
          <issue>3</issue>
          ) (
          <year>2007</year>
          )
          <fpage>461</fpage>
          -
          <lpage>471</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10958-007-0453-2
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>T.</given-names>
             
            <surname>Chojecki</surname>
          </string-name>
          , et al.,
          <article-title>On affine forestry over integral do-mains and families of deep JordanGauss graphs</article-title>
          ,
          <source>Eur. J. Math</source>
          .
          <volume>11</volume>
          (
          <issue>10</issue>
          ) (
          <year>2025</year>
          ).
          <source>doi:10.1007/s40879-024-00798-2</source>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Ustimenko</surname>
          </string-name>
          , et al.,
          <article-title>On the constructions of new symmetric ciphers based on nonbijective multivariate maps of prescribed degree, Secur</article-title>
          . Commun. Netw. (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          . doi:
          <volume>10</volume>
          .1155/
          <year>2019</year>
          /2137561
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Ustimenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
           
          <article-title>Chojecki, Walks on algebraic small world graphs of large girth and new secure stream ciphers</article-title>
          ,
          <source>in: Intelligent Systems and Applications (IntelliSys)</source>
          ,
          <source>Lecture Notes in Networks and Systems</source>
          ,
          <volume>1067</volume>
          ,
          <year>2024</year>
          ,
          <fpage>525</fpage>
          -
          <lpage>538</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -66431-1_
          <fpage>37</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>P.</given-names>
             L. K. 
            <surname>Priyadarsini</surname>
          </string-name>
          ,
          <article-title>A survey on some applications of graph theory in cryptography</article-title>
          ,
          <source>J. Discret. Math. Sci. Cryptogr</source>
          .
          <volume>18</volume>
          (
          <issue>3</issue>
          ) (
          <year>2015</year>
          )
          <fpage>209</fpage>
          -
          <lpage>217</lpage>
          . doi:
          <volume>10</volume>
          .1080/09720529.
          <year>2013</year>
          .878819
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>V.</surname>
          </string-name>
           
          <article-title>Ustimenko, Graphs in terms of algebraic geometry, symbolic computations and secure communications in post-quantum world</article-title>
          .
          <source>UMCS Editorial House, Lublin</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Cary</surname>
          </string-name>
          ,
          <string-name>
            <surname>R.</surname>
          </string-name>
           
          <article-title>Venkatesam, A message authentication code based on unimodular matrix groups</article-title>
          ,
          <source>Advances, in: Lecture Notes in Computer Science, 23rd Annual Int. Cryptology Conf.</source>
          ,
          <year>2003</year>
          ,
          <fpage>500</fpage>
          -
          <lpage>512</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -45146-4_
          <fpage>29</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Bellare</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
           J. Bernstein,
          <string-name>
            <surname>S.</surname>
          </string-name>
           Tessaro,
          <article-title>Hash-function based PRFs: AMAC and its multi-user security</article-title>
          ,
          <source>in: Lecture Notes in Computer Science</source>
          ,
          <year>2016</year>
          ,
          <fpage>566</fpage>
          -
          <lpage>595</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>662</fpage>
          -49890- 3_
          <fpage>22</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>K.</given-names>
             
            <surname>Yasuda</surname>
          </string-name>
          .
          <article-title>A double-piped mode of operation for MACs, PRFs and PROs: Security beyond the birthday barrier</article-title>
          ,
          <source>in: Lecture Notes in Computer Science</source>
          ,
          <year>2009</year>
          ,
          <fpage>242</fpage>
          -
          <lpage>259</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          - 01001-9_
          <fpage>14</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>X.</given-names>
             
            <surname>Wang</surname>
          </string-name>
          , et al.,
          <source>Cryptanalysis on HMAC/NMACMD5 and MD5-MAC, in: Lecture Notes in Computer Science</source>
          ,
          <volume>5479</volume>
          ,
          <year>2009</year>
          ,
          <fpage>121</fpage>
          -
          <lpage>133</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -01001-
          <issue>9</issue>
          _
          <fpage>7</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>G.</surname>
          </string-name>
           Leurent,
          <string-name>
            <given-names>T.</given-names>
             
            <surname>Peyrin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
             
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>New generic attacks against hash-based MACs</article-title>
          , in: Advances in Cryptology-ASIACRYPT,
          <volume>8270</volume>
          ,
          <year>2013</year>
          ,
          <fpage>11</fpage>
          -
          <lpage>20</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26] N. 
          <string-name>
            <surname>Koblitz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
           Menezes, Another look at HMAC,
          <source>Cryptology ePrint Archive, Report 2012/074</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Dodis</surname>
          </string-name>
          , et al., Message authentication, revisited,
          <source>in: Advances in cryptology (EUROCRYPT)</source>
          ,
          <volume>7237</volume>
          ,
          <year>2012</year>
          ,
          <fpage>355</fpage>
          -
          <lpage>374</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -29011-4_
          <fpage>22</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Bessalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
           Abramov,
          <article-title>Efficient commutative PQC algorithms on isogenies of Edwards curves</article-title>
          ,
          <source>Cryptogr</source>
          .
          <volume>8</volume>
          (
          <issue>3</issue>
          ), iss.
          <volume>38</volume>
          (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          . doi:
          <volume>10</volume>
          .3390/cryptography8030038
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Multifunctional</surname>
            <given-names>CRS</given-names>
          </string-name>
          <article-title>encryption scheme on isogenies of nonsupersingular Edwards curves</article-title>
          , in: Workshop on Classic, Quantum, and
          <string-name>
            <surname>Post-Quantum</surname>
            <given-names>Cryptography</given-names>
          </string-name>
          ,
          <volume>3504</volume>
          ,
          <year>2023</year>
          ,
          <fpage>12</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>R.</surname>
          </string-name>
           Wenger,
          <article-title>Extremal graphs with no C4, C6 and C10s</article-title>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Comb</surname>
          </string-name>
          . Theory, Ser B.,
          <volume>52</volume>
          (
          <year>1991</year>
          )
          <fpage>113</fpage>
          -
          <lpage>116</lpage>
          . doi:
          <volume>10</volume>
          .1016/
          <fpage>0095</fpage>
          -
          <lpage>8956</lpage>
          (
          <issue>91</issue>
          )
          <fpage>90097</fpage>
          -
          <lpage>4</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>B.</given-names>
             
            <surname>Bollobash</surname>
          </string-name>
          , Extremal graph theory, Academic Press, London,
          <year>1978</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Krendelev,
          <string-name>
            <surname>P.</surname>
          </string-name>
           Sazonova,
          <article-title>Parametric hash function resistant to attack by quantum computer</article-title>
          ,
          <source>in: 2018 Federated Conf. on Computer Science and Information Systems (ACSIS)</source>
          ,
          <volume>15</volume>
          , (
          <year>2018</year>
          )
          <fpage>387</fpage>
          -
          <lpage>390</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>