On the applications of extremal graph theory to coding theory and cryptography M Polak, U Romańczuk, V Ustimenko, A Wróblewska Electronic Notes in Discrete Mathematics 43, 329-342, 2013 | 44 | 2013 |
On the constructions of new symmetric ciphers based on nonbijective multivariate maps of prescribed degree V Ustimenko, U Romańczuk-Polubiec, A Wróblewska, MK Polak, E Zhupa Security and Communication Networks 2019, 2019 | 29 | 2019 |
On LDPC codes corresponding to infinite family of graphs A (k, K) M Polak, V Ustimenko 2012 Federated Conference on Computer Science and Information Systems …, 2012 | 16 | 2012 |
On the implementation of new symmetric ciphers based on non-bijective multivariate maps V Ustymenko, A Wróblewska, U Romanczuk-Polubiec, E Zhupa, M Polak 2018 Federated Conference on Computer Science and Information Systems …, 2018 | 11 | 2018 |
Graph based linear error correcting codes M Polak, E Zhupa arXiv preprint arXiv:1612.03279, 2016 | 6 | 2016 |
ON STREAM CIPHER BASED ON FAMILY OF GRAPHS D (n, q)˜ OF INCREASING GIRTH M Polak, V Ustimenko Albanian Journal of Mathematics 8 (1), 37-45, 2014 | 6 | 2014 |
On hyperelliptic curves of genus 3, Algebraic Curves and Their Applications, 2019 L Beshaj, M Polak MR 3916739, 161-173, 0 | 5 | |
On hyperelliptic curves of genus 3 L Beshaj, M Polak arXiv preprint arXiv:1806.02849, 2018 | 4 | 2018 |
Examples of Ramanujan and expander graphs for practical applications M Polak, V Ustimenko 2013 Federated Conference on Computer Science and Information Systems, 499-505, 2013 | 4 | 2013 |
On hyperelliptic curves of genus 3 L Beshaj, M Polak Algebraic Curves and Their Applications 724, 161, 2019 | 3 | 2019 |
Accelerating multivariate cryptography with constructive affine stream transformations M Carenzo, M Polak 2019 Federated Conference on Computer Science and Information Systems …, 2019 | 2 | 2019 |
On LDPC Codes Based on Families of Expanding Graphs of Increasing Girth without Edge-Transitive Automorphism Groups M Polak, V Ustimenko Cryptography and Security Systems: Third International Conference, CSS 2014 …, 2014 | 2 | 2014 |
Keyed hash function from large girth expander graphs E Zhupa, MK Polak arXiv preprint arXiv:1903.06267, 2019 | 1 | 2019 |
On new expanders of unbounded degree for practical applications in informatics M Polak, VA Ustimenko Доповіді Національної академії наук України, 44-50, 2014 | 1 | 2014 |
LDPC codes based on algebraic graphs M Polak, V Ustimenko Annales Universitatis Mariae Curie-Sklodowska, sectio AI–Informatica 12 (3 …, 2012 | 1 | 2012 |
On LDPC codes corresponding to affine parts of generalized polygons M Polak, V Ustimenko Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica 11 (2), 2011 | 1 | 2011 |
Designing and Delivering a Post-Quantum Cryptography Course TJ Borrelli, M Polak, S Radziszowski Proceedings of the 55th ACM Technical Symposium on Computer Science …, 2024 | | 2024 |
KEYED HASH FUNCTION FROM LARGE GIRTH EXPANDER GRAPHS M Polak, E Zhupa Albanian Journal of Mathematics 16 (1), 25-39, 2022 | | 2022 |
Research Article On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree V Ustimenko, U RomaNczuk-Polubiec, A Wróblewska, MK Polak, E Zhupa | | 2019 |
On the new applications of algebraic graph theory to multivariate cryptography VA Ustimenko, U Romanczuk-Polubiec, A Wroblewska, M Polak Минск: Институт математики НАН Беларуси, 2015 | | 2015 |