Page 1

Displaying 1 – 2 of 2

Showing per page

Generalized Kotov-Ushakov attack on tropical Stickel protocol based on modified tropical circulant matrices

Sulaiman Alhussaini, Craig Collett, Sergeĭ Sergeev (2024)

Kybernetika

After the Kotov-Ushakov attack on the tropical implementation of Stickel protocol, various attempts have been made to create a secure variant of such implementation. Some of these attempts used a special class of commuting matrices resembling tropical circulants, and they have been proposed with claims of resilience against the Kotov-Ushakov attack, and even being potential post-quantum candidates. This paper, however, reveals that a form of the Kotov-Ushakov attack remains applicable and, moreover,...

G-matrices, J -orthogonal matrices, and their sign patterns

Frank J. Hall, Miroslav Rozložník (2016)

Czechoslovak Mathematical Journal

A real matrix A is a G-matrix if A is nonsingular and there exist nonsingular diagonal matrices D 1 and D 2 such that A - T = D 1 A D 2 , where A - T denotes the transpose of the inverse of A . Denote by J = diag ( ± 1 ) a diagonal (signature) matrix, each of whose diagonal entries is + 1 or - 1 . A nonsingular real matrix Q is called J -orthogonal if Q T J Q = J . Many connections are established between these matrices. In particular, a matrix A is a G-matrix if and only if A is diagonally (with positive diagonals) equivalent to a column permutation of...

Currently displaying 1 – 2 of 2

Page 1