scientific article; zbMATH DE number 954401

From MaRDI portal
Revision as of 20:40, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4718481

zbMath0868.94001MaRDI QIDQ4718481

Scott A. Vanstone, Alfred J. Menezes, Paul C. van Oorschot

Publication date: 8 December 1996


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

An efficient implementation of PRNGs based on the digital sawtooth mapUNBIASED QUANTUM RANDOM NUMBER GENERATION BASED ON SQUEEZED VACUUM STATEEfficient three-party authenticated key agreement protocol in certificateless cryptographyNimix:An involutary nonlinear vectorial boolean functionPublic key cryptography based on ergodic matrices over finite fieldA generic solution to realize public verifiability of signcryptionA practical approach to attaining chosen ciphertext securityAn efficient ECDSA-based signature scheme for wireless networksFeistel-inspired scrambling improves the quality of linear congruential generatorsThe self-power map and collecting all residue classesOptimal Use of Montgomery Multiplication on Smart CardsOff-Line Group Signatures with Smart CardsAuthenticated group key agreement protocol based on twist conjugacy problem in near-ringsModel Checking Security ProtocolsUnnamed ItemAn Application of Quasigroups in All-Or-Nothing TransformUsing Semidirect Product of (Semi)groups in Public Key CryptographyOn ASGS framework: general requirements and an example of implementationCertificateless Proxy Re-Encryption Without PairingsCryptanalysis of Reduced-Round WhirlwindA New Non-Merkle-Damgård Structural Hash Function with Provable SecurityQuantum computation and cryptography: An overviewCryptographic pseudo-random sequences from the chaotic Hénon mapUnnamed ItemUnnamed ItemAn efficient approach for secure multi-party computation without authenticated channelByzantine-resilient distributed state estimation: a min-switching approachLinear Cryptanalysis of the PP-1 and PP-2 Block CiphersPartial Key Exposure Attack on CRT-RSACryptanalysis of the Full 8.5-Round REESSE3+ Block CipherComment on ``An enhanced and secured RSA public cryptosystem algorithm using Chinese remainder theorem (ESRPKC)Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained PlatformsMiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative ComplexityBalloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential AttacksSecurity analysis and improvement of a quantum multi-signature protocolQuantum public-key encryption schemes based on conjugate codingModified Alternating Step Generators with Non-Linear ScramblerA note on ``New quantum key agreement protocols based on Bell statesApplications of Simon's algorithm in quantum attacks on Feistel variantsProof the Skewes' number is not an integer using lattice points and tangent lineAlgebraic and quantum attacks on two digital signature schemesCryptanalysis of a Classical Chaos-Based Cryptosystem with Some Quantum Cryptography FeaturesOn the uniformity of distribution of the RSA pairsOn random walks for Pollard's rho methodOn the Entropy of Oscillator-Based True Random Number GeneratorsUnnamed ItemOn the distribution of the power generatorPeriod of the power generator and small values of Carmichael’s functionAuthentic Quantum NoncesConcealment and Its Applications to Authenticated EncryptionA construction of a key exchange protocolDesign of strong cryptographic schemes based on Latin SquaresAnalysis of Message Injection in Stream Cipher-Based Hash FunctionsCollisions of MMO-MD5 and Their Impact on Original MD5Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate RepresentationEfficient Multiplication in Finite Field Extensions of Degree 5Cryptanalysis of the Knapsack GeneratorMeet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolSecurity of the most significant bits of the Shamir message passing schemeSome baby-step giant-step algorithms for the low hamming weight discrete logarithm problemA large family of Boolean functionsA generic approach to searching for JacobiansSecure N-dimensional simultaneous dense coding and applicationsIMPROVING TWO NOVEL THREE-PARTY ENCRYPTED KEY EXCHANGE PROTOCOLS WITH PERFECT FORWARD SECRECYPost-Quantum Cryptography: State of the ArtDesigning Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret KeysAn Efficient Post-Quantum One-Time Signature SchemeRemarks on Gödel’s code as a hash functionFormal analysis of security protocols for wireless sensor networksSufficient conditions for factoring a class of large integersProxy signature schemes with time limitationStructure computation and discrete logarithms in finite abelian $p$-groupsОбзор уязвимостей некоторых протоколов выработки общего ключа с аутентификацией на основе пароля и принципы построения протокола SESPAKEEquidistant filters based on skew ML-sequences over fieldsThe Differential Analysis of S-FunctionsOptimal Covering Codes for Finding Near-CollisionsCommutative Encryption Method Based on Hidden Logarithm ProblemLessons Learnt from the Cryptanalysis of Chaos-Based CiphersOn the Final Exponentiation for Calculating Pairings on Ordinary Elliptic CurvesAN INTELLIGENT SECURITY AGENT FOR A RELIABLE CIPHER SYSTEM USING PINGPONGA New Approach to χ 2 Cryptanalysis of Block CiphersMeet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVALParallel Logical Cryptanalysis of the Generator A5/1 in BNB-Grid SystemCryptanalysis and improvements on some graph-based authentication schemesOn the Rabin SignatureCompanion Matrix and Recognition of Primitive PolynomialA New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public KeysA construction ofp-ary balanced sequence with largek-error linear complexityHardware optimizations of stream cipher rabbitModular exponentiation via the explicit Chinese remainder theoremImprovement of key generation for a number field based knapsack cryptosystemCryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problemThe GN-authenticated key agreementOne private-key for all DL-based cryptosystemsIdentity oriented signature scheme based on quadratic residuesA public key cryptosystem based on a subgroup membership problemA secret sharing scheme based on cellular automataEfficient proxy signature schemes using self-certified public keysNewton polynomials and a class of Diophantine equations







This page was built for publication: