scientific article; zbMATH DE number 774344
From MaRDI portal
Publication:4839149
cryptographyvariable length codescryptologyknapsackHill cipherlatin squarespublic keyVigenère cipher
Data encryption (aspects in computer science) (68P25) Measures of information, entropy (94A17) Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Applications to coding theory and cryptography of arithmetic geometry (14G50) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01) Authentication, digital signatures and secret sharing (94A62)
Recommendations
Cited in
(only showing first 100 items - show all)- Image encryption using \(q\)-deformed logistic map
- A fast image encryption scheme based on chaotic standard map
- scientific article; zbMATH DE number 481378 (Why is no real title available?)
- Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem
- Cryptanalysis of a new image encryption algorithm based on hyper-chaos
- A novel chaotic block cryptosystem based on iterating map with output-feedback
- Constructing strength three covering arrays with augmented annealing
- On the distribution of the Diffie-Hellman pairs
- Secure group key agreement protocol based on chaotic hash
- Breaking an encryption scheme based on chaotic baker map
- Cryptanalysis of ISO/IEC 9796-1
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- On secret sharing schemes
- Analysis and improvement of a chaos-based image encryption algorithm
- How to fake an RSA signature by encoding modular root finding as a SAT problem
- Non-admissible tracks in Shamirs scheme
- Cryptanalysis of a discrete-time synchronous chaotic encryption system
- Lower bounds for robust secret sharing schemes
- Two-weight codes, graphs and orthogonal arrays
- On the power generator and its multivariate analogue
- Encyclopedia of Cryptography and Security
- One-way hash function construction based on the chaotic map with changeable-parameter
- Lower bounds on the information rate of secret sharing schemes with homogeneous access structure.
- scientific article; zbMATH DE number 1731748 (Why is no real title available?)
- Cryptanalysis of a spatiotemporal chaotic cryptosystem
- Lessons learnt from the cryptanalysis of chaos-based ciphers
- A new spin on quantum cryptography: avoiding trapdoors and embracing public keys
- A new chaotic cryptosystem
- scientific article; zbMATH DE number 854547 (Why is no real title available?)
- An optimal multisecret threshold scheme construction
- Admissible tracks in Shamir's scheme
- A block encryption algorithm based on dynamic sequences of multiple chaotic systems
- Cryptanalysis and improvement on a cryptosystem based on a chaotic map
- scientific article; zbMATH DE number 54007 (Why is no real title available?)
- A more secure parallel keyed hash function based on chaotic neural network
- A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
- On the distribution of the power generator
- Period of the power generator and small values of Carmichael's function
- Discrete chaotic cryptography using external key
- Parallel keyed hash function construction based on chaotic maps
- Constructions for anonymous secret sharing schemes using combinatorial designs
- ONLINE SECURE CHATTING SYSTEM USING DISCRETE CHAOTIC MAP
- Joint compression and encryption using chaotically mutated Huffman trees
- A fast image encryption and authentication scheme based on chaotic maps
- A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis
- A chaos-based hash function with both modification detection and localization capabilities
- Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps
- Collision analysis of one kind of chaos-based hash function
- Applications of tripled chaotic maps in cryptography
- Observer-based hyperchaos synchronization in cascaded discrete-time systems
- Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map
- scientific article; zbMATH DE number 2221909 (Why is no real title available?)
- Cryptanalysis of a chaotic secure communication system
- Design the hyperchaotic cryptosystems via the Gerschgorin theorem
- Analysis and improvement for the performance of Baptista's cryptographic scheme
- Authenticated key agreement in dynamic peer groups
- Color image encryption based on one-time keys and robust chaotic maps
- Hash function based on piecewise nonlinear chaotic map
- A new cryptosystem using generalized Mersenne primes
- Public key protocols over the ring \(E_{p}^{(m)}\)
- Linear broadcast encryption schemes
- Cryptanalysis of an ergodic chaotic cipher
- Attacks on Shamir's `RSA for paranoids'
- Robust vector space secret sharing schemes
- Cryptanalysis of a discrete chaotic cryptosystem using external key
- scientific article; zbMATH DE number 3937099 (Why is no real title available?)
- Generation of key predistribution schemes using secret sharing schemes
- Cryptanalyzing a discrete-time chaos synchronization secure communication system
- Cryptanalysis of a cryptographic scheme based on delayed chaotic neural networks
- Breaking projective chaos synchronization secure communication using filtering and generalized synchronization
- Heterogeneous chaotic systems based cryptography
- Cryptanalysis of a chaotic encryption system
- On the uniformity of distribution of the RSA pairs
- Lossless chaotic color image cryptosystem based on DNA encryption and entropy
- Introduction to Cryptography
- A cryptographic and coding-theoretic perspective on the global rules of cellular automata
- THE BENFORD-NEWCOMB DISTRIBUTION AND UNAMBIGUOUS CONTEXT-FREE LANGUAGES
- A Classical Introduction to Cryptography
- A key agreement protocol based on group actions
- Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack
- ElGamal cryptosystems on Boolean functions
- Computing shifts in 90/150 cellular automata sequences
- Some new algebraic structures of soft sets
- On hidden sums compatible with a given block cipher diffusion layer
- scientific article; zbMATH DE number 2221548 (Why is no real title available?)
- The identity problem of finitely generated bi-ideals
- Fundamentals of cryptology. A professional reference and interactive tutorial. Incl. 1 CD-ROM
- A CHAOS-BASED PSEUDO-RANDOM NUMBER GENERATOR AND ITS APPLICATION IN VOICE COMMUNICATIONS
- scientific article; zbMATH DE number 193512 (Why is no real title available?)
- On the uniformity of distribution of the elliptic curve ElGamal signature.
- scientific article; zbMATH DE number 3932944 (Why is no real title available?)
- Soft matrix product and soft cryptosystem
- New secret sharing scheme based on linear code
- On the complexity of the sequential sampling method
- On the security analysis of a Hopfield chaotic neural network-based image encryption algorithm
- ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
- Handbook of Financial Cryptography and Security
- scientific article; zbMATH DE number 6705391 (Why is no real title available?)
- Evolutionary computation based cryptanalysis: a first study
- THE EULER TOTIENT FUNCTION ON QUADRATIC FIELDS
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4839149)