scientific article
From MaRDI portal
Publication:2770462
zbMath0997.94001MaRDI QIDQ2770462
Publication date: 10 February 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
textbookcryptographycryptanalysissecret sharing schemesadvanced encryption standardelliptic curve DSA
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50) Authentication, digital signatures and secret sharing (94A62) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01)
Related Items (64)
On multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fields ⋮ Image encryption using random bit sequence based on chaotic maps ⋮ Practical cryptanalysis of ISO 9796-2 and EMV signatures ⋮ Study on the security of the authentication scheme with key recycling in QKD ⋮ How to repair the Hill cipher ⋮ Type systems equivalent to data-flow analyses for imperative languages ⋮ Cheating-immune secret sharing schemes from codes and cumulative arrays ⋮ A hidden number problem in small subgroups ⋮ Improved Markov chain Monte Carlo method for cryptanalysis substitution-transposition cipher ⋮ Multi-party quantum key agreement protocol for detection of collusive attacks in each sub-circle segment by headers ⋮ Designing key-dependent chaotic S-box with larger key space ⋮ Chaos-based secure satellite imagery cryptosystem ⋮ Saints and Scoundrels and Two Theorems That Are Really the Same ⋮ Unnamed Item ⋮ Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion ⋮ New fault attacks using Jacobi symbol and application to regular right-to-left algorithms ⋮ A public key cryptosystem based on three new provable problems ⋮ Provably secure three-party password-based authenticated key exchange protocol ⋮ Some lattice attacks on DSA and ECDSA ⋮ Quantum identity authentication with single photon ⋮ A new improving quantum secret sharing scheme ⋮ An improvised version of Hill’s cipher ⋮ Revisiting Wiener’s Attack – New Weak Keys in RSA ⋮ A mutual authenticated key agreement scheme over insecure networks ⋮ Robust biometric-based three-party authenticated key establishment protocols ⋮ A note on Yao's theorem about pseudo-random generators ⋮ Linear dimensionality reduction by maximizing the Chernoff distance in the transformed space ⋮ A geometric protocol for cryptography with cards ⋮ Polynomial representations of the Diffie-Hellman mapping ⋮ Encryption schemes using orthogonal arrays ⋮ Assessing the effectiveness of artificial neural networks on problems related to elliptic curve cryptography ⋮ Attacks to some verifiable multi-secret sharing schemes and two improved schemes ⋮ A case study in almost-perfect security for unconditionally secure communication ⋮ A multisecret sharing scheme for color images based on cellular automata ⋮ Quantum secure two-party computation for set intersection with rational players ⋮ Universal quantum encryption for quantum signature using the swap test ⋮ New efficient and practical verifiable multi-secret sharing schemes ⋮ Deciphering an Undergraduate Cryptology Course ⋮ Self-generated-certificate public key encryption without pairing and its application ⋮ Affinity of permutations of \(\mathbb F_{2}^{n}\) ⋮ Some observations on the theory of cryptographic hash functions ⋮ A secure scheme to share secret color images ⋮ Secret sharing schemes based on graphical codes ⋮ Image cipher applications using the elliptical curve and chaos ⋮ Generalized nonlinearity of \(S\)-boxes ⋮ Garden of Eden configurations for 2-D cellular automata with rule 2460 N ⋮ Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors ⋮ Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols ⋮ Distortion-free secret image sharing mechanism using modulus operator ⋮ Decrypting classical cipher text using Markov chain Monte Carlo ⋮ Quantum hashing via \(\epsilon\)-universal hashing constructions and classical fingerprinting ⋮ Characterizing Padding Rules of MD Hash Functions Preserving Collision Security ⋮ Lifting and Elliptic Curve Discrete Logarithms ⋮ Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks ⋮ Domain extender for collision resistant hash functions: Improving upon Merkle-Damgård iteration ⋮ An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem ⋮ Chaotic image encryption design using Tompkins-Paige algorithm ⋮ Application based construction and optimization of substitution boxes over 2D mixed chaotic maps ⋮ Cryptosystems based on semi-distributive algebras ⋮ Dynamic multi-party quantum key agreement protocol based on commutative encryption ⋮ The GN-authenticated key agreement ⋮ A secret sharing scheme based on cellular automata ⋮ Unnamed Item ⋮ A Bird’s-Eye View of Modern Symmetric Cryptography from Combinatorial Designs
This page was built for publication: