scientific article; zbMATH DE number 954401
zbMATH Open0868.94001MaRDI QIDQ4718481FDOQ4718481
Authors: Scott A. Vanstone, Alfred Menezes, P. C. Van Oorschot
Publication date: 8 December 1996
Title of this publication is not available (Why is that?)
Recommendations
identificationauthenticationcryptographydigital signatureshash functionspseudorandom sequencesstream ciphersblock ciphersprimality testingkey managementpublic key systemsmulti-precision integer arithmetic
Cryptography (94A60) General reference works (handbooks, dictionaries, bibliographies, etc.) pertaining to information and communication theory (94-00)
Cited In (only showing first 100 items - show all)
- An efficient and robust image encryption scheme for medical applications
- Sanitizable Signatures
- Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions
- On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials
- Some observations on the theory of cryptographic hash functions
- A hidden number problem in small subgroups
- An efficient collision detection method for computing discrete logarithms with Pollard's rho
- Implementing the 4-dimensional GLV method on GLS elliptic curves with \(j\)-invariant 0
- Security of a key agreement protocol based on chaotic maps
- Secure Communication Systems Based on the Synchronization of Chaotic Systems
- An identity-based encryption scheme with compact ciphertexts
- On the power generator and its multivariate analogue
- An improved two-party identity-based authenticated key agreement protocol using pairings
- Parallel modular exponentiation using load balancing without precomputation
- A suite of algorithms for key distribution and authentication in centralized secure multicast environments
- A new identity based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields \(Z_p\)
- Pseudorandom number generators based on random covers for finite groups
- Security of message authentication codes in the presence of key-dependent messages
- Security proofs for identity-based identification and signature schemes
- On linear complexity of sequences over \(\text{GF}(2^n)\)
- Using Semidirect Product of (Semi)groups in Public Key Cryptography
- The cost of false alarms in Hellman and rainbow tradeoffs
- A construction ofp-ary balanced sequence with largek-error linear complexity
- Pseudo-Random Bit Generation Based on 2D Chaotic Maps of Logistic Type and Its Applications in Chaotic Cryptography
- On random walks for Pollard's rho method
- True random number generation from bioelectrical and physical signals
- The trace of an optimal normal element and low complexity normal bases
- High-performance hardware of the sliding-window method for parallel computation of modular exponentiations
- Private authentication
- A simple stream cipher with proven properties
- On the distribution of the Diffie-Hellman pairs
- A new spin on quantum cryptography: avoiding trapdoors and embracing public keys
- Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers
- A revised key agreement protocol based on chaotic maps
- Hierarchical combination of intruder theories
- Quantum proxy signature with provable security
- RFID authentication efficient proactive information security within computational security
- A family of elliptic curve pseudorandom binary sequences
- Title not available (Why is that?)
- Pseudo-random bit generator based on multi-modal maps
- Bit-oriented quantum public-key encryption based on quantum perfect encryption
- A novel method of S-box design based on chaotic map and composition method
- Compositions of linear functions and applications to hashing
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- Results on multiples of primitive polynomials and their products over GF(2)
- An efficient implementation of Bailey and Borwein's algorithm for parallel random number generation on graphics processing units
- Type-Based Proxy Re-encryption and Its Construction
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
- Chaos-based secure satellite imagery cryptosystem
- Modelling the shrinking generator in terms of linear CA
- Public key protocols over the ring \(E_{p}^{(m)}\)
- Security of the most significant bits of the Shamir message passing scheme
- Authentication schemes from actions on graphs, groups, or rings
- A provably secure non-iterative hash function resisting birthday attack
- A public key cryptosystem based on three new provable problems
- Counting by quantum eigenvalue estimation
- Improved Markov chain Monte Carlo method for cryptanalysis substitution-transposition cipher
- Improved multi-pass fast correlation attacks with applications
- On the distribution of the power generator
- Period of the power generator and small values of Carmichael's function
- A generic approach to searching for Jacobians
- Open problems in hash function security
- Asymptotic granularity reduction and its application
- Decrypting classical cipher text using Markov chain Monte Carlo
- Improving the high order nonlinearity lower bound for Boolean functions with given algebraic immunity
- Provably secure randomized blind signature scheme based on bilinear pairing
- A non-interactive deniable authentication scheme based on designated verifier proofs
- Title not available (Why is that?)
- Pseudo random number generator based on synchronized chaotic maps
- Complexity of computation in finite fields
- A comparison of cryptanalytic tradeoff algorithms
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- A fast correlation attack on LILI-128
- Signal-flow-based analysis of wireless security protocols
- On the linear complexity of binary lattices
- Efficient hardware implementation of finite fields with applications to cryptography
- Polynomial basis multiplication over \(\text{GF}(2^m)\)
- One-way hash function construction based on 2D coupled map lattices
- Quantum computation and quantum information
- DiscreteZOO: a fingerprint database of discrete objects
- A new cryptosystem using generalized Mersenne primes
- The mathematical art of concentrating information
- Attacks on quantum key distribution protocols that employ non-ITS authentication
- Breaking RSA may be as difficult as factoring
- A novel color image encryption algorithm based on spatial permutation and quantum chaotic map
- Quantum key agreement against collective decoherence
- On multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fields
- On various nonlinearity measures for Boolean functions
- Construction of a class of quantum Boolean functions based on the Hadamard matrix
- Walsh transforms and cryptographic applications in bias computing
- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- On the typical values of the cross-correlation measure
- Security Analysis of the Strong Diffie-Hellman Problem
- Bug Attacks
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4718481)