Publication:4274294
From MaRDI portal
zbMath0789.94001MaRDI QIDQ4274294
Publication date: 14 December 1993
bibliography; cryptography; cryptographic protocols; one-way hash functions; cryptographic algorithms; source code listings
94A60: Cryptography
94-01: Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory
Related Items
Some new large (Δ, 3)‐graphs, Mixing properties of modified additive generators, Deciphering an Image Cipher Based on Mixed Transformed Logistic Maps, Analysis of families of hash functions defined by automata over a finite ring, Espresso: a stream cipher for 5G wireless communication systems, Increasing the security of hash functions, Cycle detection for secure chaos-based encryption, An improved key agreement protocol based on chaos, Analyzing the structure of a class of linear automata over a ring \(Z_{p^k}\), Design and analysis of small-state grain-like stream ciphers, The meeting businessmen problem: requirements and limitations, SECRET IMAGE SHARING BASED ON CHAOTIC MAP AND CHINESE REMAINDER THEOREM, An image encryption technique based on coupled map lattice and one-time S-Boxes based on complex chaotic system, A Single-Key Attack on the Full GOST Block Cipher, A chaotic block encryption scheme based on the piecewise nonlinear map, CONTINUOUS VARIABLE QUANTUM SIGNATURE ALGORITHM