Analysis of public-key cryptography using a 3-regular graph with a perfect dominating set | IEEE Conference Publication | IEEE Xplore