2022
DOI: 10.1155/2022/8992934
|View full text |Cite
|
Sign up to set email alerts
|

On Graph‐Transversal Designs and Graph‐Authentication Codes Based on Mutually Orthogonal Graph Squares

Abstract: Combinatorial designs have many interesting and genuine wide applications in areas including analysis and design of algorithms, cryptography, analysis and design of experiments, storage system design, tournament scheduling, optical communications, and computer networks to mention just a few areas. In this paper, we are concerned with the transversal designs and authentication codes as direct applications of combinatorial designs. The novelty of the current paper is demonstrated by the fact that it is the first… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…All the constructed results in this paper can be used to generate new graph-orthogonal arrays, new graph-authentication codes, and new graph-transversal designs [3,23]. +ey can also be used in the design of experiments [24].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…All the constructed results in this paper can be used to generate new graph-orthogonal arrays, new graph-authentication codes, and new graph-transversal designs [3,23]. +ey can also be used in the design of experiments [24].…”
Section: Discussionmentioning
confidence: 99%
“…El-Mesady et al [22] generalized the MacNeish's Kronecker product theorem of MOLS. MOGS were used to construct graph-transversal designs and graphauthentication codes in [3,23]. MOGS are used to construct orthogonal arrays that have many applications [24].…”
Section: Introductionmentioning
confidence: 99%
“…Step 4: Encrypted Message Block Cipher 2: {4, 8, 24,32,48,56,72,80,96,104,120,128,77,157,221,30,118,182,15,111,55,136,16,144,152,160,168,176,184,192,200,208,216,93,157,221,38,126,190,52,119,175,224,232,7,240,248,256,264,272,280,288,296,304,101,165,229,54,134,198,23,91,183,10,9,…”
Section: Illustration For a Block Cipher Consider The Plaintext "I Fl...mentioning
confidence: 99%
“…Ustimenko [8] used the graphs with the largest girths in constructing a cryptosystem. A few more applications of graph theory in coding theory can be referred to in [9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%