scientific article

From MaRDI portal
Publication:2770462

zbMath0997.94001MaRDI QIDQ2770462

Douglas R. Stinson

Publication date: 10 February 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (64)

On multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fieldsImage encryption using random bit sequence based on chaotic mapsPractical cryptanalysis of ISO 9796-2 and EMV signaturesStudy on the security of the authentication scheme with key recycling in QKDHow to repair the Hill cipherType systems equivalent to data-flow analyses for imperative languagesCheating-immune secret sharing schemes from codes and cumulative arraysA hidden number problem in small subgroupsImproved Markov chain Monte Carlo method for cryptanalysis substitution-transposition cipherMulti-party quantum key agreement protocol for detection of collusive attacks in each sub-circle segment by headersDesigning key-dependent chaotic S-box with larger key spaceChaos-based secure satellite imagery cryptosystemSaints and Scoundrels and Two Theorems That Are Really the SameUnnamed ItemCryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusionNew fault attacks using Jacobi symbol and application to regular right-to-left algorithmsA public key cryptosystem based on three new provable problemsProvably secure three-party password-based authenticated key exchange protocolSome lattice attacks on DSA and ECDSAQuantum identity authentication with single photonA new improving quantum secret sharing schemeAn improvised version of Hill’s cipherRevisiting Wiener’s Attack – New Weak Keys in RSAA mutual authenticated key agreement scheme over insecure networksRobust biometric-based three-party authenticated key establishment protocolsA note on Yao's theorem about pseudo-random generatorsLinear dimensionality reduction by maximizing the Chernoff distance in the transformed spaceA geometric protocol for cryptography with cardsPolynomial representations of the Diffie-Hellman mappingEncryption schemes using orthogonal arraysAssessing the effectiveness of artificial neural networks on problems related to elliptic curve cryptographyAttacks to some verifiable multi-secret sharing schemes and two improved schemesA case study in almost-perfect security for unconditionally secure communicationA multisecret sharing scheme for color images based on cellular automataQuantum secure two-party computation for set intersection with rational playersUniversal quantum encryption for quantum signature using the swap testNew efficient and practical verifiable multi-secret sharing schemesDeciphering an Undergraduate Cryptology CourseSelf-generated-certificate public key encryption without pairing and its applicationAffinity of permutations of \(\mathbb F_{2}^{n}\)Some observations on the theory of cryptographic hash functionsA secure scheme to share secret color imagesSecret sharing schemes based on graphical codesImage cipher applications using the elliptical curve and chaosGeneralized nonlinearity of \(S\)-boxesGarden of Eden configurations for 2-D cellular automata with rule 2460 NImproved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime FactorsStronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant ProtocolsDistortion-free secret image sharing mechanism using modulus operatorDecrypting classical cipher text using Markov chain Monte CarloQuantum hashing via \(\epsilon\)-universal hashing constructions and classical fingerprintingCharacterizing Padding Rules of MD Hash Functions Preserving Collision SecurityLifting and Elliptic Curve Discrete LogarithmsNode Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture AttacksDomain extender for collision resistant hash functions: Improving upon Merkle-Damgård iterationAn efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystemChaotic image encryption design using Tompkins-Paige algorithmApplication based construction and optimization of substitution boxes over 2D mixed chaotic mapsCryptosystems based on semi-distributive algebrasDynamic multi-party quantum key agreement protocol based on commutative encryptionThe GN-authenticated key agreementA secret sharing scheme based on cellular automataUnnamed ItemA Bird’s-Eye View of Modern Symmetric Cryptography from Combinatorial Designs




This page was built for publication: