scientific article; zbMATH DE number 954401
From MaRDI portal
Publication:4718481
Recommendations
Cited in
(only showing first 100 items - show all)- A method for symbolic analysis of security protocols
- Asymptotically optimal perfect steganographic systems
- On the security of a spatiotemporal chaotic cryptosystem
- Selling multiple secrets to a single buyer
- A secure scheme to share secret color images
- The design of a secure and fair sealed-bid auction service
- Steganalytic method based on short and repeated sequence distance statistics
- A secret sharing scheme based on cellular automata
- Increasing the security of hash functions
- Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities
- Approximation of a chaotic orbit as a cryptanalytical method on Baptista's cipher
- An efficient multi-receipt mechanism for uncoercible anonymous electronic voting
- Interpolation of the discrete logarithm in \(\mathbb{F}_{q}\) by Boolean functions and by polynomials in several variables modulo a divisor of \(q-1\).
- Novel orbit based symmetric cryptosystems
- Encyclopedia of Cryptography and Security
- A review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass point
- Self-generated-certificate public key encryption without pairing and its application
- Authenticated group key agreement protocol based on twist conjugacy problem in near-rings
- Cryptanalysis and improvements on some graph-based authentication schemes
- A chaotic stream cipher and the usage in video protection
- A stream cipher based on a spatiotemporal chaotic system
- Koblitz curve cryptosystems
- On the impossibility of highly-efficient blockcipher-based hash functions
- Shrinking generators based on \(\sigma \)-LFSRs
- New Constructions for Secure Hash Functions
- Security risk during the transient in a key exchange protocol using random signals and feedback
- A Versatile Reconfigurable Bit-Serial Multiplier Architecture in Finite Fields GF(2m)
- Efficient generation of shortest addition-multiplication chains
- Blind one-time signature and its applications
- Cryptography with chaos and shadowing
- An analysis of the blockcipher-based hash functions from PGV
- Efficient \(p\)th root computations in finite fields of characteristic \(p\)
- Secure electronic bills of lading: Blind counts and digital signatures
- 3D: A Three-Dimensional Block Cipher
- An efficient multi-round anonymous auction protocol
- Approximations of Dynamical Systems and Their Applications to Cryptography
- Secure implementation of channel abstractions
- A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation
- Memoryless near-collisions via coding theory
- The square root Diffie-Hellman problem
- Testing Stream Ciphers by Finding the Longest Substring of a Given Density
- A novel image hash algorithm resistant to print-scan
- Finite automata in cryptography
- Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem
- Public-key quantum digital signature scheme with one-time pad private-key
- Provably secure Rabin-\(p\) cryptosystem in hybrid setting
- Multi-party authenticated key agreement protocols from multi-linear forms
- On the number of sparse RSA exponents
- Multiple point compression on elliptic curves
- Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security
- Modification tolerant signature schemes: location and correction
- The generalized XOR lemma
- Chaos synchronization for a class of discrete dynamical systems on the \(N\)-dimensional torus
- Breaking an orbit-based symmetric cryptosystem
- Polynomial representations of the Lucas logarithm
- Fault-based attack on Montgomery's ladder algorithm
- On asymptotic expansion in the random allocation of particles by sets
- Structure computation and discrete logarithms in finite abelian \(p\)-groups
- Design and Analysis on a Parallel Chaos-Based Hash Function
- Random Gray code and its performance analysis for image hashing
- Zero-knowledge identification scheme based on Weil pairing
- Permutation and sampling with maximum length CA or pseudorandom number generation
- Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks
- On random walks for Pollard's rho method
- Authentication schemes from actions on graphs, groups, or rings
- Pseudo-Random Bit Generation Based on 2D Chaotic Maps of Logistic Type and Its Applications in Chaotic Cryptography
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- On the distribution of the Diffie-Hellman pairs
- Type-Based Proxy Re-encryption and Its Construction
- Hierarchical combination of intruder theories
- Counting by quantum eigenvalue estimation
- Sanitizable signatures
- A provably secure non-iterative hash function resisting birthday attack
- Improving the high order nonlinearity lower bound for Boolean functions with given algebraic immunity
- Provably secure randomized blind signature scheme based on bilinear pairing
- On linear complexity of sequences over \(\text{GF}(2^n)\)
- Some observations on the theory of cryptographic hash functions
- Security analysis of some diffusion mechanisms used in chaotic ciphers
- Decrypting classical cipher text using Markov chain Monte Carlo
- On the power generator and its multivariate analogue
- Pseudo random number generator based on synchronized chaotic maps
- An improved two-party identity-based authenticated key agreement protocol using pairings
- Parallel modular exponentiation using load balancing without precomputation
- A suite of algorithms for key distribution and authentication in centralized secure multicast environments
- A new identity based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields \(Z_p\)
- Pseudorandom number generators based on random covers for finite groups
- Security of message authentication codes in the presence of key-dependent messages
- True random number generation from bioelectrical and physical signals
- The trace of an optimal normal element and low complexity normal bases
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- An efficient collision detection method for computing discrete logarithms with Pollard's rho
- Implementing the 4-dimensional GLV method on GLS elliptic curves with \(j\)-invariant 0
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- Secure communication systems based on the synchronization of chaotic systems
- Using Semidirect Product of (Semi)groups in Public Key Cryptography
- A new spin on quantum cryptography: avoiding trapdoors and embracing public keys
- Improved Markov chain Monte Carlo method for cryptanalysis substitution-transposition cipher
- Improved multi-pass fast correlation attacks with applications
- Complexity of computation in finite fields
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4718481)