scientific article; zbMATH DE number 954401
From MaRDI portal
Publication:4718481
Recommendations
Cited in
(only showing first 100 items - show all)- A public key cryptosystem based on a subgroup membership problem
- scientific article; zbMATH DE number 481378 (Why is no real title available?)
- Quantum identification protocol with technologically bounded parties
- Linear Cryptanalysis of Non Binary Ciphers
- A novel protocol for multiparty quantum key management
- Chaotic map based key agreement with/out clock synchronization
- Group theoretic properties of Rijndael-like ciphers
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- A PTAS for the minimum weight connected vertex cover \(P_3\) problem on unit disk graphs
- Accelerating Pollard's rho algorithm on finite fields
- Certifying assembly with formal security proofs: the case of BBS
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
- A variant of digital signature algorithm
- From orthogonal projections to a generalized quantum search
- A random encoding method for secure data communication: An extension of sequential coding
- Asymptotic normality associated with generalized occupancy problems
- A verifiable multi-secret sharing scheme based on cellular automata
- Random small Hamming weight products with applications to cryptography
- A multisecret sharing scheme for color images based on cellular automata
- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
- A Scheme to Base a Hash Function on a Block Cipher
- A practical anonymous multi-authority e-cash scheme.
- Revisiting Correlation-Immunity in Filter Generators
- Cryptanalysis of MDC-2
- On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks
- Efficient three-party authenticated key agreement protocol in certificateless cryptography
- A combined DCA: GA for constructing highly nonlinear balanced Boolean functions in cryptography
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- Critique of the related-key attack concept
- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
- An overview of distinguishing attacks on stream ciphers
- The Twin Diffie-Hellman Problem and Applications
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Discrete chaotic cryptography using external key
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
- Problems of cryptography as discrete optimization tasks
- A simple variant of the Merkle-Damgård scheme with a permutation
- Encryption and decryption of images with chaotic map lattices
- Computing discrete logarithms with the parallelized kangaroo method.
- Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table
- Security weaknesses of authenticated key agreement protocols
- Hash Functions and RFID Tags: Mind the Gap
- Collisions for variants of the BLAKE hash function
- The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
- Convertible multi-authenticated encryption scheme
- Generalised Mersenne numbers revisited
- Cryptanalysis of Grindahl
- A note on ``Selling multiple secrets to a single buyer
- A novel keyed parallel hashing scheme based on a new chaotic system
- One-time pad as a nonlinear dynamical system
- Tweakable block ciphers
- Security proof of the canonical form of self-synchronizing stream ciphers
- Enforcing the security of a time-bound hierarchical key assignment scheme
- A PTAS for minimum weighted connected vertex cover \(P_3\) problem in 3-dimensional wireless sensor networks
- Fast Lagrange-Newton transformations
- Computing elliptic curve discrete logarithms with the negation map
- Secure and Efficient Group Key Agreements for Cluster Based Networks
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
- A secure and scalable group key exchange system
- On a family of pseudorandom binary sequences
- Irreducible trinomials over finite fields
- A novel elliptic curve scalar multiplication algorithm against power analysis
- Public-key cryptography based on bounded quantum reference frames
- Comment on ``Quantum signature scheme with weak arbitrator
- A note on quantum related-key attacks
- Combating online in-auction fraud: clues, techniques and challenges
- Cryptography using multiple one-dimensional chaotic maps
- Discrete logarithm problems with auxiliary inputs
- Multi-recastable e-bidding game with dual-blindness
- Properties of hash functions based on Gluškov product of automata
- On random walks for Pollard's rho method
- Authentication schemes from actions on graphs, groups, or rings
- Pseudo-Random Bit Generation Based on 2D Chaotic Maps of Logistic Type and Its Applications in Chaotic Cryptography
- A chaotic maps-based authenticated key agreement protocol with strong anonymity
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- On the distribution of the Diffie-Hellman pairs
- Type-Based Proxy Re-encryption and Its Construction
- Hierarchical combination of intruder theories
- Counting by quantum eigenvalue estimation
- Sanitizable signatures
- A provably secure non-iterative hash function resisting birthday attack
- Improving the high order nonlinearity lower bound for Boolean functions with given algebraic immunity
- Provably secure randomized blind signature scheme based on bilinear pairing
- On linear complexity of sequences over \(\text{GF}(2^n)\)
- Some observations on the theory of cryptographic hash functions
- Security analysis of some diffusion mechanisms used in chaotic ciphers
- Decrypting classical cipher text using Markov chain Monte Carlo
- On the power generator and its multivariate analogue
- Pseudo random number generator based on synchronized chaotic maps
- An improved two-party identity-based authenticated key agreement protocol using pairings
- Parallel modular exponentiation using load balancing without precomputation
- A suite of algorithms for key distribution and authentication in centralized secure multicast environments
- A new identity based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields \(Z_p\)
- Pseudorandom number generators based on random covers for finite groups
- Security of message authentication codes in the presence of key-dependent messages
- True random number generation from bioelectrical and physical signals
- The trace of an optimal normal element and low complexity normal bases
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- An efficient collision detection method for computing discrete logarithms with Pollard's rho
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4718481)