scientific article; zbMATH DE number 954401
From MaRDI portal
Publication:4718481
Recommendations
Cited in
(only showing first 100 items - show all)- Algorithms of information authentication for the automatic control systems on the basis of structures in finite vector spaces
- Information authentication in automated control systems based on finite groups with multidimensional cyclicity
- Distinguishing Multiplications from Squaring Operations
- Attack on a concast signature scheme
- Modular exponentiation via the explicit Chinese remainder theorem
- Cryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptography
- New algorithms and protocols for information authentication in automatic control systems
- Formal analysis of security protocols for wireless sensor networks
- On the probability of generating a lattice
- Secrets of linear feedback shift registers
- Attacks on a double length blockcipher-based hash proposal
- Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme
- Multiparty authentication services and key agreement protocols with semi-trusted third party.
- Self-certified multi-proxy signature schemes with message recovery
- An application of index forms in cryptography
- Algorithm for factoring some RSA and Rabin moduli
- An improvement of a cryptanalysis algorithm
- A note on ``New quantum key agreement protocols based on Bell states
- Collision attack on \({\mathtt Grindahl}\)
- A self-pairing map and its applications to cryptography
- Characterization of polynomially complete quasigroups based on Latin squares for cryptographic transformations.
- On the security of cryptosystem using automorphism groups
- A new non-Merkle-Damgård structural hash function with provable security
- On the \(k\)-error linear complexity of binary sequences derived from the discrete logarithm in finite fields
- Properties of certain semigroups and their potential as platforms for cryptosystems
- Computation of edit probabilities and edit distances for the A5-type keystream generator
- Cryptography and cryptographic protocols
- Quantum circuits for \(\mathbb F_{2^n}\)-multiplication with subquadratic gate count
- Decoding interleaved Reed-Solomon codes over noisy channels
- An efficient binary sequence generator with cryptographic applications
- THE EULER TOTIENT FUNCTION ON QUADRATIC FIELDS
- On hiding messages in the oversampled Fourier coefficients
- Breaking an ID-based encryption based on discrete logarithm and factorization problems
- On the low Hamming weight discrete logarithm problem for nonadjacent representations
- A low-complexity LUT-based squaring algorithm
- A note on the multiple-recursive matrix method for generating pseudorandom vectors
- A probabilistic cryptanalytic method for a time-variant permutation generator
- Lifting and Elliptic Curve Discrete Logarithms
- A comparison of two approaches to pseudorandomness
- Correlation (Fast) Attack against Nonlinear Combination Generator
- A deterministic algorithm for the discrete logarithm problem in a semigroup
- On the linear complexities of two classes of quaternary sequences of even length with optimal autocorrelation
- Montgomery exponent architecture based on programmable cellular automata
- Reduced Complexity Attacks on the Alternating Step Generator
- Error-correcting codes and cryptography
- Polynomial interpolation of cryptographic functions related to Diffie-Hellman and discrete logarithm problem
- Improved low-computation partially blind signatures.
- Multi-party key agreement protocols with cheater identification
- Improved authenticated multiple-key agreement protocol without using conventional one-way function.
- Modelling nonlinear sequence generators in terms of linear cellular automata
- A public key cryptosystem based on a subgroup membership problem
- scientific article; zbMATH DE number 481378 (Why is no real title available?)
- Quantum identification protocol with technologically bounded parties
- Linear Cryptanalysis of Non Binary Ciphers
- A novel protocol for multiparty quantum key management
- Chaotic map based key agreement with/out clock synchronization
- Group theoretic properties of Rijndael-like ciphers
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- A PTAS for the minimum weight connected vertex cover \(P_3\) problem on unit disk graphs
- Accelerating Pollard's rho algorithm on finite fields
- Certifying assembly with formal security proofs: the case of BBS
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
- A variant of digital signature algorithm
- From orthogonal projections to a generalized quantum search
- A random encoding method for secure data communication: An extension of sequential coding
- Asymptotic normality associated with generalized occupancy problems
- A verifiable multi-secret sharing scheme based on cellular automata
- Random small Hamming weight products with applications to cryptography
- A multisecret sharing scheme for color images based on cellular automata
- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
- A Scheme to Base a Hash Function on a Block Cipher
- A practical anonymous multi-authority e-cash scheme.
- Revisiting Correlation-Immunity in Filter Generators
- Cryptanalysis of MDC-2
- On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks
- Efficient three-party authenticated key agreement protocol in certificateless cryptography
- A combined DCA: GA for constructing highly nonlinear balanced Boolean functions in cryptography
- Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
- Critique of the related-key attack concept
- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
- An overview of distinguishing attacks on stream ciphers
- The Twin Diffie-Hellman Problem and Applications
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Discrete chaotic cryptography using external key
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal
- Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
- Problems of cryptography as discrete optimization tasks
- A simple variant of the Merkle-Damgård scheme with a permutation
- Encryption and decryption of images with chaotic map lattices
- Computing discrete logarithms with the parallelized kangaroo method.
- Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table
- Security weaknesses of authenticated key agreement protocols
- Hash Functions and RFID Tags: Mind the Gap
- Collisions for variants of the BLAKE hash function
- The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
- Convertible multi-authenticated encryption scheme
- Generalised Mersenne numbers revisited
- Cryptanalysis of Grindahl
- A note on ``Selling multiple secrets to a single buyer
- A novel keyed parallel hashing scheme based on a new chaotic system
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4718481)