scientific article; zbMATH DE number 774344
zbMATH Open0855.94001MaRDI QIDQ4839149FDOQ4839149
Authors: D. R. Stinson
Publication date: 16 July 1995
Title of this publication is not available (Why is that?)
Recommendations
cryptographyvariable length codescryptologyknapsackHill cipherlatin squarespublic keyVigenère cipher
Data encryption (aspects in computer science) (68P25) Measures of information, entropy (94A17) Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Applications to coding theory and cryptography of arithmetic geometry (14G50) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01) Authentication, digital signatures and secret sharing (94A62)
Cited In (only showing first 100 items - show all)
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- A new cryptosystem using generalized Mersenne primes
- Secure group key agreement protocol based on chaotic hash
- On the power generator and its multivariate analogue
- A block encryption algorithm based on dynamic sequences of multiple chaotic systems
- Title not available (Why is that?)
- Authenticated key agreement in dynamic peer groups
- Non-admissible tracks in Shamirs scheme
- Two-weight codes, graphs and orthogonal arrays
- Admissible tracks in Shamir's scheme
- Constructions for anonymous secret sharing schemes using combinatorial designs
- Constructing strength three covering arrays with augmented annealing
- Title not available (Why is that?)
- Title not available (Why is that?)
- How to fake an RSA signature by encoding modular root finding as a SAT problem
- Lower bounds for robust secret sharing schemes
- Title not available (Why is that?)
- Breaking an encryption scheme based on chaotic baker map
- On secret sharing schemes
- Joint compression and encryption using chaotically mutated Huffman trees
- Attacks on Shamir's `RSA for paranoids'
- Robust vector space secret sharing schemes
- Cryptanalysis of a spatiotemporal chaotic cryptosystem
- On the distribution of the Diffie-Hellman pairs
- Cryptanalysis of a cryptographic scheme based on delayed chaotic neural networks
- A novel chaotic block cryptosystem based on iterating map with output-feedback
- A new spin on quantum cryptography: avoiding trapdoors and embracing public keys
- Cryptanalysis of a discrete chaotic cryptosystem using external key
- Encyclopedia of Cryptography and Security
- A new chaotic cryptosystem
- Cryptanalysis of a chaotic secure communication system
- Cryptanalysis of an ergodic chaotic cipher
- Title not available (Why is that?)
- Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map
- A more secure parallel keyed hash function based on chaotic neural network
- Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps
- Color image encryption based on one-time keys and robust chaotic maps
- Hash function based on piecewise nonlinear chaotic map
- Breaking projective chaos synchronization secure communication using filtering and generalized synchronization
- Cryptanalysis and improvement on a cryptosystem based on a chaotic map
- Discrete chaotic cryptography using external key
- Parallel keyed hash function construction based on chaotic maps
- A chaos-based hash function with both modification detection and localization capabilities
- Lower bounds on the information rate of secret sharing schemes with homogeneous access structure.
- Applications of tripled chaotic maps in cryptography
- Observer-based hyperchaos synchronization in cascaded discrete-time systems
- Public key protocols over the ring \(E_{p}^{(m)}\)
- Generation of key predistribution schemes using secret sharing schemes
- Heterogeneous chaotic systems based cryptography
- A fast image encryption scheme based on chaotic standard map
- Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem
- Cryptanalysis of a new image encryption algorithm based on hyper-chaos
- A fast image encryption and authentication scheme based on chaotic maps
- A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis
- Cryptanalysis of a chaotic encryption system
- On the distribution of the power generator
- Period of the power generator and small values of Carmichael's function
- ONLINE SECURE CHATTING SYSTEM USING DISCRETE CHAOTIC MAP
- Cryptanalyzing a discrete-time chaos synchronization secure communication system
- A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
- Design the hyperchaotic cryptosystems via the Gerschgorin theorem
- Analysis and improvement of a chaos-based image encryption algorithm
- Lessons learnt from the cryptanalysis of chaos-based ciphers
- Linear broadcast encryption schemes
- Cryptanalysis of a discrete-time synchronous chaotic encryption system
- One-way hash function construction based on the chaotic map with changeable-parameter
- Title not available (Why is that?)
- Analysis and improvement for the performance of Baptista's cryptographic scheme
- Cryptanalysis of ISO/IEC 9796-1
- An optimal multisecret threshold scheme construction
- Image encryption using \(q\)-deformed logistic map
- Collision analysis of one kind of chaos-based hash function
- A Classical Introduction to Cryptography
- Soft matrix product and soft cryptosystem
- The accessibility of an access structure
- Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack
- On the uniformity of distribution of the elliptic curve ElGamal signature.
- Improvement of Tseng et al.'s authenticated encryption scheme with message linkages
- Title not available (Why is that?)
- A key agreement protocol based on group actions
- Computing shifts in 90/150 cellular automata sequences
- A one-way function from thermodynamics and applications to cryptography
- Cryptology. An introduction to the science of encoding, concealing and hiding
- An optimal and scalable parallelization of the two-list algorithm for the subset-sum problem
- Improving the trade-off between storage and communication in broadcast encryption schemes
- On hidden sums compatible with a given block cipher diffusion layer
- Randomness in secret sharing and visual cryptography schemes
- Construction of one-way hash functions with increased key space using adaptive chaotic maps
- Practical cryptography. Algorithms and implementations using C++
- Neural cryptography with queries
- Applications of design theory for the constructions of MDS matrices for lightweight cryptography
- Lossless chaotic color image cryptosystem based on DNA encryption and entropy
- Application of Gray codes to the study of the theory of symbolic dynamics of unimodal maps
- A CHAOS-BASED PSEUDO-RANDOM NUMBER GENERATOR AND ITS APPLICATION IN VOICE COMMUNICATIONS
- Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
- Title not available (Why is that?)
- New secret sharing scheme based on linear code
- Evolutionary computation based cryptanalysis: a first study
- On the uniformity of distribution of the RSA pairs
- A cryptographic and coding-theoretic perspective on the global rules of cellular automata
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4839149)