scientific article; zbMATH DE number 774344

From MaRDI portal
Publication:4839149

zbMath0855.94001MaRDI QIDQ4839149

Douglas R. Stinson

Publication date: 16 July 1995


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

A cryptographic and coding-theoretic perspective on the global rules of cellular automataA key agreement protocol based on group actionsElGamal cryptosystems on Boolean functionsCryptanalysis of an ergodic chaotic cipherImage encryption using \(q\)-deformed logistic mapSecurity aspects of the Cayley hash function using discrete heisenberg groupCryptanalyzing a discrete-time chaos synchronization secure communication systemNeural cryptography with queriesA one-way function from thermodynamics and applications to cryptographyConstruction of one-way hash functions with increased key space using adaptive chaotic mapsTwo-weight codes, graphs and orthogonal arraysLower bounds for robust secret sharing schemesOn hidden sums compatible with a given block cipher diffusion layerOn secret sharing schemesRobust vector space secret sharing schemesAttacks on Shamir's `RSA for paranoids'Improving the trade-off between storage and communication in broadcast encryption schemesApplications of design theory for the constructions of MDS matrices for lightweight cryptographyLossless chaotic color image cryptosystem based on DNA encryption and entropyUnnamed ItemSecure group key agreement protocol based on chaotic hashSome constructions of systematic authentication codes using Galois ringsAn optimal and scalable parallelization of the two-list algorithm for the subset-sum problemCryptanalysis of a chaotic encryption systemPublic key protocols over the ring \(E_{p}^{(m)}\)THE EULER TOTIENT FUNCTION ON QUADRATIC FIELDSCryptanalysis of a cryptosystem using multiple one-dimensional chaotic mapsApplying evolutionary computation methods for the cryptanalysis of Feistel ciphersConstructions for anonymous secret sharing schemes using combinatorial designsCryptanalysis of a cryptographic scheme based on delayed chaotic neural networksObserver-based hyperchaos synchronization in cascaded discrete-time systemsCryptanalysis and improvement on a block cryptosystem based on iteration a chaotic mapApplications of tripled chaotic maps in cryptographyAnalysis and improvement of a chaos-based image encryption algorithmA novel chaotic block cryptosystem based on iterating map with output-feedbackCryptanalysis of a spatiotemporal chaotic cryptosystemSoft matrix product and soft cryptosystemHash function based on piecewise nonlinear chaotic mapColor image encryption based on one-time keys and robust chaotic mapsAdmissible tracks in Shamir's schemeA CHAOS-BASED PSEUDO-RANDOM NUMBER GENERATOR AND ITS APPLICATION IN VOICE COMMUNICATIONSOn the power generator and its multivariate analogueThe identity problem of finitely generated bi-idealsCollision analysis of one kind of chaos-based hash functionHow to fake an RSA signature by encoding modular root finding as a SAT problemA fast image encryption scheme based on chaotic standard mapOn the security analysis of a Hopfield chaotic neural network-based image encryption algorithmCryptanalysis of a discrete chaotic cryptosystem using external keyCryptanalysis of a spatiotemporal chaotic image/video cryptosystemCryptanalysis of a new image encryption algorithm based on hyper-chaosOn the uniformity of distribution of the RSA pairsConstructing strength three covering arrays with augmented annealingTHE BENFORD-NEWCOMB DISTRIBUTION AND UNAMBIGUOUS CONTEXT-FREE LANGUAGESA New (k,n)-Threshold Secret Sharing Scheme and Its ExtensionDesign the hyperchaotic cryptosystems via the Gerschgorin theoremOn the distribution of the power generatorPeriod of the power generator and small values of Carmichael’s functionDESCRIPTION OF NON-ENDOMORPHIC MAXIMUM PERFECT CIPHERS WITH TWO-VALUED PLAINTEXT ALPHABETWATERMARKING CIPHERSA new chaotic cryptosystemCryptanalysis of dynamic look-up table based chaotic cryptosystemsCryptanalysis of ISO/IEC 9796-1New secret sharing scheme based on linear codeImprovement of Tseng et al.'s authenticated encryption scheme with message linkagesNon-admissible tracks in Shamirs schemeAuthenticated key agreement in dynamic peer groupsBreaking an encryption scheme based on chaotic baker mapA more secure parallel keyed hash function based on chaotic neural networkONLINE SECURE CHATTING SYSTEM USING DISCRETE CHAOTIC MAPCryptanalysis of a discrete-time synchronous chaotic encryption systemAn optimal multisecret threshold scheme constructionAnalysis and improvement for the performance of Baptista's cryptographic schemeBreaking projective chaos synchronization secure communication using filtering and generalized synchronizationOne-way hash function construction based on the chaotic map with changeable-parameterParallel keyed hash function construction based on chaotic mapsECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted MessageA block encryption algorithm based on dynamic sequences of multiple chaotic systemsA chaos-based hash function with both modification detection and localization capabilitiesJoint compression and encryption using chaotically mutated Huffman treesA new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysisA fast image encryption and authentication scheme based on chaotic mapsHeterogeneous chaotic systems based cryptographyEvolutionary computation based cryptanalysis: a first studySystematic authentication codes using additive polynomialsApplication of Gray codes to the study of the theory of symbolic dynamics of unimodal mapsLinear broadcast encryption schemesGeneration of key predistribution schemes using secret sharing schemesLessons Learnt from the Cryptanalysis of Chaos-Based CiphersA linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing schemeCryptanalysis and improvement on a cryptosystem based on a chaotic mapA New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public KeysRandomness in secret sharing and visual cryptography schemesThe accessibility of an access structureEfficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attackCryptanalysis of a chaotic secure communication systemLower bounds on the information rate of secret sharing schemes with homogeneous access structure.Some new algebraic structures of soft setsGeneralized Mignotte's Sequences Over Polynomial RingsDiscrete chaotic cryptography using external keyOn the uniformity of distribution of the elliptic curve ElGamal signature.On the distribution of the Diffie-Hellman pairsA new cryptosystem using generalized Mersenne primesComputing shifts in 90/150 cellular automata sequences