Research Article
Tropical Cryptography Based on Multiple Exponentiation Problem of Matrices
Table 1
Comparison among relevant tropical schemes.
| ||||||||||||||||||||||||||||||||||||||||
Note. that √ means that the scheme can resist the corresponding attack, while × does not. |
| ||||||||||||||||||||||||||||||||||||||||
Note. that √ means that the scheme can resist the corresponding attack, while × does not. |