<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Testing Quasigroup Identities using Product of Testing QuasiSgerqouuepnIcdeentities using Product of Sequence?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Eliˇska Ochodkov´a</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jiˇr´ı Dvorsky´</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>V´aclav Sna´ˇsel</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ajith Abraham</string-name>
          <email>ajith.abraham@ieee.org</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>3T3ecOhsntircaavlaU-nPivoerrusibtay</institution>
          ,
          <addr-line>oCf zOecshtraRveapublic feliska.och</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Electrical Engineering and Computer Science VSˇBD-epTaercthmneincatloUfnCiovmerpsiuttyerofSOcisetnrcaeva 17. lisFtoEpEaCduS</institution>
          ,
          <addr-line>1V5,S7B08</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Eliska Ochodkova</institution>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>UCneivnetersritoyf oEfxSceclileenncceeafnord QTuecahnntioloagbyle</institution>
          ,
          <addr-line>O.SQ. uBarlaitgystoafdSseprlvaiscse,2E, NorwegianNU-7n4iv9e1rsTitryonodfhSeciime n,cNeoarnwdayTechnology</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2010</year>
      </pub-date>
      <issue>107</issue>
      <fpage>155</fpage>
      <lpage>162</lpage>
      <abstract>
        <p>Non-associative quasigroups are well known combinatorial designs with many different applications. Many cryptographic algorithms based on quasigroups primitives have been published. There are several classifications of quasigroups based on their algebraic properties. In this paper we propose a new classification of quasigroups based upon strings (product elements) obtained by a product of a sequence. It is shown in this paper that the more various results of the product elements, the less associative quasigroup.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        1 Introduction
Almost all known constructions of cryptographic algorithms have made use of
associative algebraic structures such as groups and fields. There is a possibility
to use non-associative quasigroups [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] , well known combinatorial designs with a
lot of theoretical results concerning them, too. Many cryptographic algorithms
based on quasigroups primitives have been published. Proposed cryptographic
algorithms are used for ciphering [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], for constructing pseudorandom
generators [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], hash functions [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], for zero knowledge protocols [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], etc. Majority of
published algorithms can be seen as rather simple experimental algorithms. As
a representative of the ambitious proposals include the stream cipher Edon80
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] published as an eSTREAM3 candidate, and the NIST’s SHA-34 competition
candidate, hash function EdonR [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>If a quasigroup is a base of some cryptographic primitive, it is necessary to
examine whether its algebraic properties, structure or other features possess a
security risk to the whole cryptographic algorithm. From all existing quasigroups
of a given order we have to select those, which do not have various identities
(as associativity is) and in which various identities appears rarely, or rather not
at all. Properties of small quasigroups (e.g. of order 4), represented as a
lookup table only, may be examined by the exhaustive search. But examination of
identities of the quasigroups of a large order, e.g. 216, may not be easy.</p>
      <p>Testing of all possible identities at once may be expensive, both in terms
of time and in terms of space. Therefore we have focused on associativity only.
If associativity holds, then for each element a, b, c ∈ Q : a ◦ (b ◦ c) = (a ◦
b) ◦ c. The situation differs when we work with non-group (i.e. non-associative)
structure: a ◦ (b ◦ c) 6= (a ◦ b) ◦ c. We have made experiments with powers ak
of all elements a ∈ Q, where k = 2, 3, . . . , n, n = |Q|, obtained by a product
of a sequence. Obtained results were evaluated and compared to the number of
associative triples identified for each quasigroup used in experiments. Tested set
of quasigroups was the subset of all distinct quasigroups of order 8. For better
representation of the results, we have used their visualization.</p>
      <p>The paper is organized as follows. Motivation of our work is introduced in
Section 2, some necessary concepts are given here too. Concept of a product
of sequence, experiments and their results are described in Section 3. Finally,
Section 4 comprise conclusion and some ideas of future works.
2
2.1</p>
      <p>Preliminaries</p>
      <p>Basic Concepts
Definition 1. Let A = {a1, a2, . . . , an} be a finite alphabet, n × n Latin square
L of order n is a matrix with entries lij ∈ A, i, j = 1, 2, . . . , n, such that each
row and each column consists of different elements of A.</p>
      <p>
        The numbers of all LSs of order ≤ 11 are known [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Number of distinct
Latin squares5 of a given order grows exceedingly quickly with the order. Latin
squares are equivalent to quasigroups. The multiplication table of a quasigroup
of order n is a Latin square of order n, and conversely every Latin square of
order n is the multiplication table of a quasigroup of order n [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
Definition 2. A quasigroup is a pair (Q, ◦), where ◦ is a binary operation on
(finite) set Q such that for all not necessarily distinct a, b ∈ Q, the equations
a ◦ x = b and y ◦ a = b. have unique solutions. We say that quasigroup (Q, ◦) is
of order n if |Q| = n.
      </p>
      <p>
        In general, the operation ◦ is neither a commutative nor an associative operation.
Every quasigroup satisfying the associative law has an identity element and is,
hence, a group. There is, for example, 576 distinct quasigroups of order 4, but
only 16 are associative. So non-associative quasigroups dominate heavily.
5 We abbreviate ’Latin square’ to LS.
Isotopism. Various methods of generating a practically unlimited number of
quasigroups of a (theoretically) arbitrary order are known and shown in various
publications. One common way of creating quasigroups is through isotopism [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
Definition 3. Let (Q1, ·) and (Q2, ◦) be two quasigroups with |Q1| = |Q2|. An
ordered triple (α, β, γ) of one-to-one mappings α, β, γ of the set Q1 onto the set
Q2 is called an isotopism of Q1 upon Q2 if α(x)◦β(y) = γ(x·y) for all x, y ∈ Q1.
      </p>
      <p>One can prove that the set of all isotopisms of a quasigroup of order n forms
a group of order (n!)3. It should be noted that the mapping γ permutes the
elements in the table of operations in a quasigroup Q1, while α and β operate
on the elements of the row and column borders of this table, respectively.
2.2</p>
      <p>
        Motivation
Design of many of the existing algorithms is based on quasigroup string
transformations [
        <xref ref-type="bibr" rid="ref11 ref7">7, 11</xref>
        ]. The following concepts are taken from [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>Consider an alphabet (i.e. a finite set) Q, and denote by Q+ the set of all
nonempty words (i.e. finite strings) formed by the elements of Q. Let (Q, ◦) is a
quasigroup. Let q = q1q2 . . . qn ∈ Q+, qi ∈ Q and l ∈ Q is a fixed element called
leader. For each l ∈ Q we define two functions el◦ and dl◦ : Q+ → Q+ as follows:
el◦ (q) = b1b2 . . . bn ⇐⇒ b1 = l ◦ q1, b2 = b1 ◦ q2, . . . , bn = bn−1 ◦ qn (1)
i.e. bi+1 = bi ◦ qi+1 for each i = 0, 1, . . . , n − 1, where b0 = l, and
dl◦ (q) = c1c2 . . . cn ⇐⇒ c1 = l ◦ q1, c2 = q1 ◦ q2, . . . , cn = qn−1 ◦ qn (2)
i.e. ci+1 = qi ◦ qi+1 for each i = 0, 1, . . . , n − 1, where q0 = l.</p>
      <p>The functions el◦ and dl◦ are called e− and d−transformation of Q+ based
on the operation ◦ with leader l. In general, several quasigroup operations on
the set Q can be used for defining quasigroup transformations. Let, ◦1, ◦2, . . . , ◦k
be such a sequence of (not necessarily distinct) quasigroup transformations. We
may also choose leaders l1, l2, . . . lk ∈ Q (not necessarily distinct), and then the
compositions • of mappings</p>
      <p>Ek = El1l2...lk = el1 • el2 • . . . • elk
(3)
and</p>
      <p>Dk = Dl1l2...lk = dl1 • dl2 • . . . • dlk (4)
are said to be E− and D−transformations of Q+ respectively. In the last
notation, we use el1 for the clarity, but formally we should use el1◦1 .</p>
      <p>
        The experiments with the length of a period of a string generated by
etransformations are mentioned in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Quasigroups are divided into
two groups, to linear and exponential quasigroups. What algebraic properties
must quasigroups of order 4 have to be linear resp. exponential? The
quasigroups are of a small order (order 4), it is therefore impossible to say whether
(besides identities) it is their structure, which affects the resulting period of the
transformed string. Quasigroups of larger order are more convenient for
analogical tests described in Sec. 3.
      </p>
      <p>
        Experiment with Product of Sequence
Let ◦ be the binary operation. Consider the finite sequence A of elements
a1, . . . , an, ai ∈ A, i = 1, 2, . . . , n, n ≥ 2. What does mean a product of this
sequence? Clearly, for n = 2 we have a1 ◦ a2, by juxtaposition a1a2. For n = 3
a product of the sequence a1, a2, a3 is defined as a set consisting of product
elements a1(a2a3) and (a1a2)a3. The product is denoted as {a1a2a3} and
symbol a1a2a3 means any product element. Generally, we can define a product of a
sequence of n elements of the set A as follows [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>Definition 4. The product of a sequence a1, a2, . . . , an of elements ai ∈ A, i =
1, 2, . . . , n is the set {a1a2 . . . an} defined by:
– for n = 2 the set {a1a2} consist of only one element a1a2,
– for n ≥ 2 the set {a1a2 . . . an} is defined as
{a1a2 . . . an} = {a1}{a2 . . . an} ∪ {a1a2}{a3 . . . an} ∪ . . . ∪ {a1 . . . an−1} ∪ {an}.</p>
      <p>
        The n elements can be joined, without changing their order, in n(2!(nn−−21))!! ways.
For e.g. n = 1, 2 . . . , 10 we obtain 1, 1, 2, 5, 14, 42, 132, 429, 1430, 4862 ways of
joining n elements. These numbers are called Catalan numbers [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The mth
Catalan number, for m ≥ 0 is given by:
      </p>
      <p>1 2m
Cm = m+1 m</p>
      <p>= m(2!(mm−−21))!! .</p>
      <p>If the operation ◦ on the set A does not hold an associativity law, we can
generally obtain distinct values a1a2 . . . an (not one common value) for all Cm
(m = n − 1, because Catalan numbers are numbered from 0) possible product
elements of the product set {a1a2 . . . an} of the sequence a1, a2, . . . , an .
3.1</p>
      <p>Experiment
We have tested product {q1q2 . . . qk} of the sequence q1, q2, . . . , qk, where all
qi ∈ Q, i = 1, 2, . . . , k are equal. So, if all elements are equal, each element is
denoted as a and we will compute a product {aa . . . a} of the sequence a, a, . . . , a.
| {kz } | {kz }
This product consists of all Ck−1 product elements. Questions is, how many
distinct values q1q2 . . . qk = aa . . . a = ak for all a ∈ Q we obtain. In the ideal
| {z }</p>
      <p>k
case we can obtain all possible values as a result; the set of possible values has
only max. n values from Q (of order n) for all powers ak.</p>
      <p>Better information about the identities in the given quasigroup gain from
the evaluation of particular product elements by the e-transformation defined in
Eq. (2). Therefore all strings b1 . . . b8, see Fig. 1, obtained during evaluation of
product elements of ak (for k = 8, a8 = b8, Fig. 1) were stored. The experiment:
– Generate a quasigroups Q of order n.
– For each element a ∈ Q and for each k, 2 ≤ k ≤ n create the product
{aa . . . a} of the sequence a, a, . . . , a, evaluate all Ck−1 product elements ak.
– Store strings b1 . . . bk and compute the number of their occurrence during
evaluation of all product elements ak.</p>
      <p>a
a
?
b1
a
?
b2
. . .
. . .</p>
      <p>a
b7
?
a</p>
      <p>
        ?
b8 = a8
Quasigroups were represented by corresponding Latin squares. We decided to
use a subset of quasigroups of order 8. We have tested:
– all n! = 40320 distinct quasigroups isotopic to additive group (Z8, +) when
only permutation α was not an identity permutation,
– a set of one million randomly generated quasigroups,
– a set of special quasigroups that consist of e.g. additive group (Z8, +), of six
well described quasigroups published in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], etc.
3.3
      </p>
    </sec>
    <sec id="sec-2">
      <title>Ideal results</title>
      <p>Results are shown on the highest (8th) power of element a. There are C7 = 429
distinct ways how to obtain it.</p>
      <p>– Ideally, for each a ∈ Q, i.e. for each a = 0, 1, . . . , 7, we obtain all 8 possible
values of a8 ∈ Q.
– For each a ∈ Q we obtain all 429 distinct strings b1 . . . b8.
– Finally, for each quasigroup (Q, ◦) we ideally obtain all together 429 × 8 =
3432 distinct strings b1 . . . b8 for all a ∈ Q.
3.4</p>
    </sec>
    <sec id="sec-3">
      <title>Experimental results</title>
      <p>
        Results of experiments are shown on the set of five chosen quasigroups
represented by their corresponding LSs. The first quasigroup is randomly generated
quasigroup No. 24 represented by L24. The second quasigroup, obtained by
nonaffine isotopy [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], is represented by corresponding LS L103. The third
quasigroup is quasigroup 104 obtained by complete mapping [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and represented
by LS L104. The fourth quasigroup is quasigroup No. 106, from [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], is
represented by LS L106. The last quasigroup (Q1, ◦) with No. 107 is represented by
corresponding LS L107 (this quasigroup is the additive group (Z8, +)).
      </p>
      <p>Numbers of distinct values a8 for each a ∈ Q for five chosen quasigroups are
shown in Table 1. Only quasigroups No. 24 and 104 have ideal results. Conversely,
quasigroup’s No. 107 results are always the same; a8 is always 0.</p>
      <p>Results of the process evaluating the strings b1 . . . b8: the best results have
quasigroups No. 24 and 104. Number of all distinct strings is higher comparing
the remaining three quasigroups. This fact is evident from Table 2 (sums of
distinct strings for each quasigroup and all a ∈ Q are shown). The higher number
of associative triples, the lower the sum of all strings. Results were also visualized,
Sec. 3.5. The greater number of subsquares of different brightness in the image
corresponds with the greater number of distinct strings b1 . . . b8 for each a8, see
Figs. 2 and 3.
We have focused only on the 8th power of quasigroups elements. For each
quasigroup (Q, ◦) and for each a8, a ∈ Q, we have generated 512 × 512 pixels images
where each subsquare (64 × 64 pixels) represents one element lij of tested
quasigroup represented by corresponding Latin square L, lij ∈ L. The more visits of
particular element, the brighter subsquare. The brightness of the subsquares is
calculated relatively to the number C7 × ir = 429 × 6 = 2574, where ir = 6
is number of strings from a2 to a8 when computing a8. The greater the sum
of distinct strings b1 . . . bn, the greater the number of subsquares of different
brightness in the image.</p>
      <p>Conclusion
Our goal is to find a new way of testing the properties of large quasigroups and
to explore the interpretation of experimental results. We have reported a new
classification of quasigroups based upon strings (product elements) obtained by
a product of a sequence. As is shown, the more various results of the product
elements, the less associative quasigroup. More precisely, values of all
possible product elements from the product set of a sequence of elements from a
given quasigroup were examined and relationships between experiment results
and associativity of tested quasigroup have been tested. Testing of quasigroup’s
identities through the product of a sequence is an appropriate method with good
results. Experiments will be repeated with quasigroups of larger order. Several
consecutive applications of a quasigroup transformations on the sequences will
be tested, too.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>O.</given-names>
            <surname>Bor</surname>
          </string-name>
          <article-title>˚uvka. Foundations of the theory of groupoids and groups</article-title>
          . Wiley,
          <year>1976</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. J. D´enes, and T. D´enes.
          <article-title>Non-associative algebraic system in cryptology. Protection against ”meet in the middle” attack</article-title>
          .
          <source>Q. and Related Systems</source>
          <volume>8</volume>
          (
          <year>2001</year>
          ):
          <fpage>7</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>J. D</surname>
          </string-name>
          <article-title>´enes, and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Keedwell</surname>
          </string-name>
          .
          <source>Latin Squares and their Applications</source>
          . New York: Akad´emiai Kiad´o, Budapest, Academic Press,
          <year>1974</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>D.</given-names>
            <surname>Gligoroski</surname>
          </string-name>
          , et al.
          <article-title>EdonR cryptographic hash function</article-title>
          .
          <source>NIST's SHA-3 hash function competition</source>
          ,
          <year>2008</year>
          , http://csrc.nist.gov/groups/ST/hash/sha-3/index.html
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>D.</given-names>
            <surname>Gligoroski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Markovski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kocarev</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Svein</surname>
          </string-name>
          .
          <source>The Stream Cipher Edon80. The eSTREAM Finalists, LNCS</source>
          <volume>4986</volume>
          (
          <year>2008</year>
          ):
          <fpage>152</fpage>
          -
          <lpage>169</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>D.</given-names>
            <surname>Gligoroski</surname>
          </string-name>
          .
          <article-title>One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations</article-title>
          .
          <source>Cryptology ePrint Archive. Report</source>
          <year>2005</year>
          /352.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>D.</given-names>
            <surname>Gligoroski</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Markovski</surname>
          </string-name>
          .
          <article-title>Cryptographic potentials of quasigroup transformations</article-title>
          . Talk at EIDMA Cryptography Working Group, Utrecht,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>P.</given-names>
            <surname>Hilton</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Pedersen</surname>
          </string-name>
          . Catalan Numbers,
          <article-title>Their Generalization, and Their Uses</article-title>
          .
          <source>Journal The Mathematical Intelligencer</source>
          ,
          <volume>13</volume>
          , no.
          <issue>2</issue>
          (
          <year>1991</year>
          ):
          <fpage>64</fpage>
          -
          <lpage>75</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Ko´scielny. NLPN Sequences over GF(q)</article-title>
          .
          <source>Quasigroups an Related Systems</source>
          <volume>4</volume>
          (
          <year>1997</year>
          ):
          <fpage>89</fpage>
          -
          <lpage>102</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>S.</given-names>
            <surname>Markovski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gligoroski</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Markovski</surname>
          </string-name>
          .
          <article-title>Classification of quasigroups by random walk on torus</article-title>
          .
          <source>J. of Appl. Math. and Comp</source>
          .
          <volume>19</volume>
          , no.
          <issue>1-2</issue>
          (
          <year>2005</year>
          ):
          <fpage>57</fpage>
          -
          <lpage>75</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>S.</given-names>
            <surname>Markovski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gligoroski</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.</given-names>
            <surname>Kocarev</surname>
          </string-name>
          .
          <article-title>Unbiased Random Sequences from Quasigroup String Transformations</article-title>
          .
          <source>in 12th International Workshop FSE</source>
          , Paris, LNCS
          <volume>3557</volume>
          (
          <year>2005</year>
          ):
          <fpage>163</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>S.</given-names>
            <surname>Markovski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gligoroski</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Bakeva</surname>
          </string-name>
          . Quasigroup and
          <string-name>
            <given-names>Hash</given-names>
            <surname>Functions</surname>
          </string-name>
          .
          <source>Disc. Math. and Appl</source>
          .,
          <source>In Proceedings of the 6th ICDMA, Bansko</source>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>K</surname>
          </string-name>
          . A. Meyer.
          <article-title>A new message authentication code based on the non-associativity of quasigroups</article-title>
          .
          <source>Ph.D Thesis</source>
          ,
          <year>2006</year>
          , http://orion.math.iastate.edu/dept/thesisarchive/PHD/KMeyerPhDSp06.pdf
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>B. D. McKay</surname>
            ,
            <given-names>and I. M.</given-names>
          </string-name>
          <string-name>
            <surname>Wanless</surname>
          </string-name>
          .
          <article-title>On the Number of Latin Squares</article-title>
          .
          <source>Journal Annals of Combinatorics</source>
          <volume>9</volume>
          , no.
          <issue>3</issue>
          (
          <year>2005</year>
          ):
          <fpage>335</fpage>
          -
          <lpage>344</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. E. Ochodkova´, and
          <string-name>
            <given-names>V.</given-names>
            <surname>Sna</surname>
          </string-name>
          <article-title>´ˇsel. Cryptographic Algorithms with Uniform Statistics</article-title>
          .
          <source>In NATO Regional Conference on Military Communications and Informations Systems Zegrze</source>
          , Poland:
          <fpage>165</fpage>
          -
          <lpage>172</lpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>K.</given-names>
            <surname>Toyoda</surname>
          </string-name>
          .
          <article-title>On axioms of linear functions. P roc</article-title>
          .
          <source>Imp. Acad. Tokyo</source>
          ,
          <volume>17</volume>
          (
          <year>1941</year>
          ):
          <fpage>221</fpage>
          -
          <lpage>227</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>