scientific article; zbMATH DE number 954401

From MaRDI portal
Publication:4718481

zbMath0868.94001MaRDI QIDQ4718481

Scott A. Vanstone, Alfred J. Menezes, Paul C. van Oorschot

Publication date: 8 December 1996


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

Security analysis of a password-based authentication protocol proposed to IEEE 1363On linear complexity of sequences over \(\text{GF}(2^n)\)Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generatorImprovements to quantum search techniques for block-ciphers, with applications to AESSelling multiple secrets to a single buyerOn the uniformity of distribution of the decryption exponent in fixed encryption exponent RSAOptimal strong primesA simple model of secure public communicationJebelean-Weber's algorithm without spurious factorsOn the use of cellular automata in symmetric cryptographyA review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass pointEfficient software-implementation of finite fields with applications to cryptographyPolynomial basis multiplication over \(\text{GF}(2^m)\)Efficient hardware implementation of finite fields with applications to cryptographyFast algorithms for determining the linear complexities of sequences over \(GF(p^{m})\) with the period \(3 n\)Studying the performance of artificial neural networks on problems related to cryptographyApplying evolutionary computation methods for the cryptanalysis of Feistel ciphersAn efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniquesPermutation and sampling with maximum length CA or pseudorandom number generationGeneralized hyper-bent functions over \(GF(p)\)Exploring confusion in product ciphers through regression analysisGuest editorial: Special issue in honor of Scott A. VanstoneFinding shortest lattice vectors faster using quantum searchThe random oracle model: a twenty-year retrospectiveOpen problems in hash function securityPower map permutations and the discrete log problemAttacks on a double length blockcipher-based hash proposalBreaking an ID-based encryption based on discrete logarithm and factorization problemsAn improvement of a cryptanalysis algorithmCollision attack on \({\mathtt Grindahl}\)Statistical properties and implementation of aperiodic pseudorandom number generatorsRandom small Hamming weight products with applications to cryptographyComputing discrete logarithms with the parallelized kangaroo method.Characterization of polynomially complete quasigroups based on Latin squares for cryptographic transformations.Multi-party key agreement protocols with cheater identificationImproved low-computation partially blind signatures.Improved authenticated multiple-key agreement protocol without using conventional one-way function.A practical anonymous multi-authority e-cash scheme.Modelling nonlinear sequence generators in terms of linear cellular automataLarge decryption exponents in RSAMultiparty authentication services and key agreement protocols with semi-trusted third party.Error-correcting codes and cryptographyCryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptographySecurity of a key agreement protocol based on chaotic mapsSteganalytic method based on short and repeated sequence distance statisticsA multisecret sharing scheme for color images based on cellular automataLinear complexity of generalized cyclotomic binary sequences of length \(2p^{m}\)A low-complexity LUT-based squaring algorithmMulti-party authenticated key agreement protocols from multi-linear formsThe generalized XOR lemmaA secure scheme to share secret color imagesChaotic map based key agreement with/out clock synchronizationNovel orbit based symmetric cryptosystemsCryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operationsParallel keyed hash function construction based on chaotic mapsAn anonymous key agreement protocol based on chaotic mapsAn efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic mapParallel hash function construction based on coupled map latticesAsymptotic granularity reduction and its applicationAn improved key agreement protocol based on chaosA verifiable multi-secret sharing scheme based on cellular automataProblems of cryptography as discrete optimization tasksAsymptotically optimal perfect steganographic systemsAlgorithms of information authentication for the automatic control systems on the basis of structures in finite vector spacesSynthesis of cryptographic interleaved sequences by means of linear cellular automataGroup theoretic properties of Rijndael-like ciphersA non-interactive deniable authentication scheme based on designated verifier proofsObtaining a secure and efficient key agreement protocol from (H)MQV and NAXOSThe trace of an optimal normal element and low complexity normal basesEfficient \(p\)th root computations in finite fields of characteristic \(p\)A variant of digital signature algorithmMontgomery exponent architecture based on programmable cellular automataThe linear complexity of generalized cyclotomic sequences with period \(2p^n\)A generic framework for anonymous authentication in mobile networksPursuit and synchronization in hydrodynamic dipolesDecrypting classical cipher text using Markov chain Monte CarloNew algorithms and protocols for information authentication in automatic control systemsCryptanalysis of an E0-like combiner with memorySecurity proofs for identity-based identification and signature schemesOn the impossibility of highly-efficient blockcipher-based hash functionsOn the security of cryptosystem using automorphism groupsCollisions for variants of the BLAKE hash functionAn overview of distinguishing attacks on stream ciphersThe twin Diffie-Hellman problem and applicationsHigh-performance hardware of the sliding-window method for parallel computation of modular exponentiationsEfficient design methods of low-weight correlation-immune functions and revisiting their basic characterizationInformation authentication in automated control systems based on finite groups with multidimensional cyclicityA secure and scalable group key exchange systemReversible data-hiding in encrypted images by redundant space transferImprovement in new three-party-authenticated key agreement scheme based on chaotic maps without password tableImplementing a chaotic cryptosystem in a 64-bit embedded system by using multiple-precision arithmeticSelf-certified multi-proxy signature schemes with message recoveryKnown-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism schemeAn application of index forms in cryptographyComputation of edit probabilities and edit distances for the A5-type keystream generatorA probabilistic cryptanalytic method for a time-variant permutation generatorA fast correlation attack on LILI-128A comparison of two approaches to pseudorandomnessThe design of a secure and fair sealed-bid auction serviceOn the distribution of the Diffie-Hellman pairs




This page was built for publication: