Follow
Monika K. Polak
Monika K. Polak
Verified email at rit.edu - Homepage
Title
Cited by
Cited by
Year
On the applications of extremal graph theory to coding theory and cryptography
M Polak, U Romańczuk, V Ustimenko, A Wróblewska
Electronic Notes in Discrete Mathematics 43, 329-342, 2013
442013
On the constructions of new symmetric ciphers based on nonbijective multivariate maps of prescribed degree
V Ustimenko, U Romańczuk-Polubiec, A Wróblewska, MK Polak, E Zhupa
Security and Communication Networks 2019, 2019
292019
On LDPC codes corresponding to infinite family of graphs A (k, K)
M Polak, V Ustimenko
2012 Federated Conference on Computer Science and Information Systems …, 2012
162012
On the implementation of new symmetric ciphers based on non-bijective multivariate maps
V Ustymenko, A Wróblewska, U Romanczuk-Polubiec, E Zhupa, M Polak
2018 Federated Conference on Computer Science and Information Systems …, 2018
112018
Graph based linear error correcting codes
M Polak, E Zhupa
arXiv preprint arXiv:1612.03279, 2016
62016
ON STREAM CIPHER BASED ON FAMILY OF GRAPHS D (n, q)˜ OF INCREASING GIRTH
M Polak, V Ustimenko
Albanian Journal of Mathematics 8 (1), 37-45, 2014
62014
On hyperelliptic curves of genus 3, Algebraic Curves and Their Applications, 2019
L Beshaj, M Polak
MR 3916739, 161-173, 0
5
On hyperelliptic curves of genus 3
L Beshaj, M Polak
arXiv preprint arXiv:1806.02849, 2018
42018
Examples of Ramanujan and expander graphs for practical applications
M Polak, V Ustimenko
2013 Federated Conference on Computer Science and Information Systems, 499-505, 2013
42013
On hyperelliptic curves of genus 3
L Beshaj, M Polak
Algebraic Curves and Their Applications 724, 161, 2019
32019
Accelerating multivariate cryptography with constructive affine stream transformations
M Carenzo, M Polak
2019 Federated Conference on Computer Science and Information Systems …, 2019
22019
On LDPC Codes Based on Families of Expanding Graphs of Increasing Girth without Edge-Transitive Automorphism Groups
M Polak, V Ustimenko
Cryptography and Security Systems: Third International Conference, CSS 2014 …, 2014
22014
Keyed hash function from large girth expander graphs
E Zhupa, MK Polak
arXiv preprint arXiv:1903.06267, 2019
12019
On new expanders of unbounded degree for practical applications in informatics
M Polak, VA Ustimenko
Доповіді Національної академії наук України, 44-50, 2014
12014
LDPC codes based on algebraic graphs
M Polak, V Ustimenko
Annales Universitatis Mariae Curie-Sklodowska, sectio AI–Informatica 12 (3 …, 2012
12012
On LDPC codes corresponding to affine parts of generalized polygons
M Polak, V Ustimenko
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica 11 (2), 2011
12011
Designing and Delivering a Post-Quantum Cryptography Course
TJ Borrelli, M Polak, S Radziszowski
Proceedings of the 55th ACM Technical Symposium on Computer Science …, 2024
2024
KEYED HASH FUNCTION FROM LARGE GIRTH EXPANDER GRAPHS
M Polak, E Zhupa
Albanian Journal of Mathematics 16 (1), 25-39, 2022
2022
Research Article On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree
V Ustimenko, U RomaNczuk-Polubiec, A Wróblewska, MK Polak, E Zhupa
2019
On the new applications of algebraic graph theory to multivariate cryptography
VA Ustimenko, U Romanczuk-Polubiec, A Wroblewska, M Polak
Минск: Институт математики НАН Беларуси, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20