
Developed on the C# platform (.NET Framework 5.0), which provides high flexibility in work, a program for performing operations (addition, multiplication, raising to the power of a large natural number, finding the inverse relatively to multiplication) on elements of extended finite fields and general linear groups over such fields. The general linear group is one of the well-known non-Abelian groups, the application of which is actively studied in the field of post-quantum cryptography. Using these operations, a number of cryptographic primitives have been implemented: the well-known Diffie-Hellman, Stickel secret key exchange protocols, and recently proposed generalizations of the Lizama-Romero protocol and the Kanwal-Ali asymmetric cryptosystem. The program allows you to explore the features of known and verify new cryptographic primitives. Using it, the trustiness of the two mentioned new primitives for different values of parameters was confirmed. Key words: finite field, general linear group, cryptographic primitive
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
