The following pages link to (Q4869527):
Displaying 50 items.
- A generator of pseudo-random numbers sequences with a very long period (Q815410) (← links)
- Error correcting codes, block designs, perfect secrecy and finite fields (Q850774) (← links)
- Image security system using recursive cellular automata substitution (Q869061) (← links)
- A formal analysis of information disclosure in data exchange (Q878760) (← links)
- Finding an internal state of RC4 stream cipher (Q881845) (← links)
- Attacks of simple block ciphers via efficient heuristics (Q881887) (← links)
- A novel edge based image steganography with \(2^k\) correction and Huffman encoding (Q894446) (← links)
- An improvement of a cryptanalysis algorithm (Q894480) (← links)
- Fair and distributed peer-to-peer allocation of a common, refillable resource (Q897403) (← links)
- Quantum protocols for untrusted computations (Q924542) (← links)
- Multiparty quantum secret sharing of secure direct communication (Q927036) (← links)
- Improving the security of multiparty quantum secret splitting and quantum state sharing (Q942430) (← links)
- Improved Feistel-based ciphers for wireless sensor network security (Q946657) (← links)
- Classification of signature-only signature models (Q954435) (← links)
- Image encryption with chaotically coupled chaotic maps (Q957610) (← links)
- Problems of cryptography as discrete optimization tasks (Q999605) (← links)
- Algorithms of information authentication for the automatic control systems on the basis of structures in finite vector spaces (Q1003091) (← links)
- A countable and time-bound password-based user authentication scheme for the applications of electronic commerce (Q1006746) (← links)
- The ring authenticated encryption scheme-how to provide a clue wisely (Q1007859) (← links)
- New algorithms and protocols for information authentication in automatic control systems (Q1015349) (← links)
- A secure and scalable group key exchange system (Q1041738) (← links)
- An application of index forms in cryptography (Q1046753) (← links)
- Linear complexity of generalized cyclotomic binary sequences of order 2 (Q1266420) (← links)
- A calculus for cryptographic protocols: The spi calculus (Q1283776) (← links)
- Zeta functions, one-way functions, and pseudorandom number generators. (Q1362085) (← links)
- Feedback shift registers, 2-adic span, and combiners with memory (Q1363072) (← links)
- A new key authentication scheme based on discrete logarithms (Q1406193) (← links)
- Chaos-based cryptograph incorporated with \(S\)-box algebraic operation (Q1411845) (← links)
- Efficient non-repudiation multicast source authentication schemes. (Q1433965) (← links)
- Computation of edit probabilities and edit distances for the A5-type keystream generator (Q1599209) (← links)
- A probabilistic cryptanalytic method for a time-variant permutation generator (Q1603353) (← links)
- Primitives for authentication in process algebras. (Q1603653) (← links)
- Inter-protocol interleaving attacks on some authentication and key distribution protocols (Q1607566) (← links)
- Efficient linear feedback shift registers with maximal period (Q1609404) (← links)
- Pseudorandom permutation (Q1612314) (← links)
- Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card (Q1637907) (← links)
- Cubic B-spline fuzzy transforms for an efficient and secure compression in wireless sensor networks (Q1671690) (← links)
- Watermarking based on discrete wavelet transform and \(q\)-deformed chaotic map (Q1694033) (← links)
- A new proxy signature scheme with revocation (Q1764733) (← links)
- Efficient on-line electronic checks (Q1765865) (← links)
- Chaotic behavior for the secret key of cryptographic system (Q1771717) (← links)
- Steganography of capacity required using modulo operator for embedding secret image (Q1774845) (← links)
- One-way hash function construction based on the chaotic map with changeable-parameter (Q1775681) (← links)
- An efficient entire chaos-based scheme for deniable authentication (Q1776630) (← links)
- Cryptography using multiple one-dimensional chaotic maps (Q1776785) (← links)
- Meta-He digital signatures based on factoring and discrete logarithms (Q1780491) (← links)
- \(s\)-partitions. (Q1853023) (← links)
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. (Q1853119) (← links)
- Topics in the theory of DNA computing. (Q1853473) (← links)
- Analysis of security protocols as open systems (Q1853583) (← links)