scientific article; zbMATH DE number 774344
From MaRDI portal
Publication:4839149
zbMath0855.94001MaRDI QIDQ4839149
Publication date: 16 July 1995
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
cryptographyvariable length codescryptologyknapsacklatin squaresHill cipherpublic keyVigenère cipher
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Measures of information, entropy (94A17) Applications to coding theory and cryptography of arithmetic geometry (14G50) Authentication, digital signatures and secret sharing (94A62) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01)
Related Items
A cryptographic and coding-theoretic perspective on the global rules of cellular automata ⋮ A key agreement protocol based on group actions ⋮ ElGamal cryptosystems on Boolean functions ⋮ Cryptanalysis of an ergodic chaotic cipher ⋮ Image encryption using \(q\)-deformed logistic map ⋮ Security aspects of the Cayley hash function using discrete heisenberg group ⋮ Cryptanalyzing a discrete-time chaos synchronization secure communication system ⋮ Neural cryptography with queries ⋮ A one-way function from thermodynamics and applications to cryptography ⋮ Construction of one-way hash functions with increased key space using adaptive chaotic maps ⋮ Two-weight codes, graphs and orthogonal arrays ⋮ Lower bounds for robust secret sharing schemes ⋮ On hidden sums compatible with a given block cipher diffusion layer ⋮ On secret sharing schemes ⋮ Robust vector space secret sharing schemes ⋮ Attacks on Shamir's `RSA for paranoids' ⋮ Improving the trade-off between storage and communication in broadcast encryption schemes ⋮ Applications of design theory for the constructions of MDS matrices for lightweight cryptography ⋮ Lossless chaotic color image cryptosystem based on DNA encryption and entropy ⋮ Unnamed Item ⋮ Secure group key agreement protocol based on chaotic hash ⋮ Some constructions of systematic authentication codes using Galois rings ⋮ An optimal and scalable parallelization of the two-list algorithm for the subset-sum problem ⋮ Cryptanalysis of a chaotic encryption system ⋮ Public key protocols over the ring \(E_{p}^{(m)}\) ⋮ THE EULER TOTIENT FUNCTION ON QUADRATIC FIELDS ⋮ Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps ⋮ Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers ⋮ Constructions for anonymous secret sharing schemes using combinatorial designs ⋮ Cryptanalysis of a cryptographic scheme based on delayed chaotic neural networks ⋮ Observer-based hyperchaos synchronization in cascaded discrete-time systems ⋮ Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map ⋮ Applications of tripled chaotic maps in cryptography ⋮ Analysis and improvement of a chaos-based image encryption algorithm ⋮ A novel chaotic block cryptosystem based on iterating map with output-feedback ⋮ Cryptanalysis of a spatiotemporal chaotic cryptosystem ⋮ Soft matrix product and soft cryptosystem ⋮ Hash function based on piecewise nonlinear chaotic map ⋮ Color image encryption based on one-time keys and robust chaotic maps ⋮ Admissible tracks in Shamir's scheme ⋮ A CHAOS-BASED PSEUDO-RANDOM NUMBER GENERATOR AND ITS APPLICATION IN VOICE COMMUNICATIONS ⋮ On the power generator and its multivariate analogue ⋮ The identity problem of finitely generated bi-ideals ⋮ Collision analysis of one kind of chaos-based hash function ⋮ How to fake an RSA signature by encoding modular root finding as a SAT problem ⋮ A fast image encryption scheme based on chaotic standard map ⋮ On the security analysis of a Hopfield chaotic neural network-based image encryption algorithm ⋮ Cryptanalysis of a discrete chaotic cryptosystem using external key ⋮ Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem ⋮ Cryptanalysis of a new image encryption algorithm based on hyper-chaos ⋮ On the uniformity of distribution of the RSA pairs ⋮ Constructing strength three covering arrays with augmented annealing ⋮ THE BENFORD-NEWCOMB DISTRIBUTION AND UNAMBIGUOUS CONTEXT-FREE LANGUAGES ⋮ A New (k,n)-Threshold Secret Sharing Scheme and Its Extension ⋮ Design the hyperchaotic cryptosystems via the Gerschgorin theorem ⋮ On the distribution of the power generator ⋮ Period of the power generator and small values of Carmichael’s function ⋮ DESCRIPTION OF NON-ENDOMORPHIC MAXIMUM PERFECT CIPHERS WITH TWO-VALUED PLAINTEXT ALPHABET ⋮ WATERMARKING CIPHERS ⋮ A new chaotic cryptosystem ⋮ Cryptanalysis of dynamic look-up table based chaotic cryptosystems ⋮ Cryptanalysis of ISO/IEC 9796-1 ⋮ New secret sharing scheme based on linear code ⋮ Improvement of Tseng et al.'s authenticated encryption scheme with message linkages ⋮ Non-admissible tracks in Shamirs scheme ⋮ Authenticated key agreement in dynamic peer groups ⋮ Breaking an encryption scheme based on chaotic baker map ⋮ A more secure parallel keyed hash function based on chaotic neural network ⋮ ONLINE SECURE CHATTING SYSTEM USING DISCRETE CHAOTIC MAP ⋮ Cryptanalysis of a discrete-time synchronous chaotic encryption system ⋮ An optimal multisecret threshold scheme construction ⋮ Analysis and improvement for the performance of Baptista's cryptographic scheme ⋮ Breaking projective chaos synchronization secure communication using filtering and generalized synchronization ⋮ One-way hash function construction based on the chaotic map with changeable-parameter ⋮ Parallel keyed hash function construction based on chaotic maps ⋮ ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message ⋮ A block encryption algorithm based on dynamic sequences of multiple chaotic systems ⋮ A chaos-based hash function with both modification detection and localization capabilities ⋮ Joint compression and encryption using chaotically mutated Huffman trees ⋮ A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis ⋮ A fast image encryption and authentication scheme based on chaotic maps ⋮ Heterogeneous chaotic systems based cryptography ⋮ Evolutionary computation based cryptanalysis: a first study ⋮ Systematic authentication codes using additive polynomials ⋮ Application of Gray codes to the study of the theory of symbolic dynamics of unimodal maps ⋮ Linear broadcast encryption schemes ⋮ Generation of key predistribution schemes using secret sharing schemes ⋮ Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers ⋮ A linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing scheme ⋮ Cryptanalysis and improvement on a cryptosystem based on a chaotic map ⋮ A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys ⋮ Randomness in secret sharing and visual cryptography schemes ⋮ The accessibility of an access structure ⋮ Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack ⋮ Cryptanalysis of a chaotic secure communication system ⋮ Lower bounds on the information rate of secret sharing schemes with homogeneous access structure. ⋮ Some new algebraic structures of soft sets ⋮ Generalized Mignotte's Sequences Over Polynomial Rings ⋮ Discrete chaotic cryptography using external key ⋮ On the uniformity of distribution of the elliptic curve ElGamal signature. ⋮ On the distribution of the Diffie-Hellman pairs ⋮ A new cryptosystem using generalized Mersenne primes ⋮ Computing shifts in 90/150 cellular automata sequences