“…They modify the Stickel's protocol using polynomial over tropical matrix algebra. Then some studies in tropical cryptography are followed such that (Grigoriev & Ponomarenko, 2005), (Grigoriev & Shpilrain, 2018), (Grigoriev & Shpilrain, 2019), (Muanalifah & Sergeev, 2020), (Ahmed et al, 2023a), (Ahmed et al, 2023b), (Durcheva et al, 2014). For analysis security the tropical cryptography, there are also some studies such that (Kotov & Ushakov, 2018), (Muanalifah & Sergeev, 2022), (Isaac & Kahrobaei, 2021), (Rudy & Monico, 2020), (Huang et al, 2022).…”