scientific article; zbMATH DE number 774344
From MaRDI portal
Publication:4839149
cryptographyvariable length codescryptologyknapsackHill cipherlatin squarespublic keyVigenère cipher
Data encryption (aspects in computer science) (68P25) Measures of information, entropy (94A17) Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Applications to coding theory and cryptography of arithmetic geometry (14G50) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01) Authentication, digital signatures and secret sharing (94A62)
Recommendations
Cited in
(only showing first 100 items - show all)- Period of the power generator and small values of Carmichael's function
- Cryptanalyzing a discrete-time chaos synchronization secure communication system
- THE EULER TOTIENT FUNCTION ON QUADRATIC FIELDS
- ONLINE SECURE CHATTING SYSTEM USING DISCRETE CHAOTIC MAP
- On the complexity of the sequential sampling method
- Design the hyperchaotic cryptosystems via the Gerschgorin theorem
- A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
- Analysis and improvement of a chaos-based image encryption algorithm
- Lessons learnt from the cryptanalysis of chaos-based ciphers
- Handbook of Financial Cryptography and Security
- Some constructions of systematic authentication codes using Galois rings
- Linear broadcast encryption schemes
- Cryptanalysis of a discrete-time synchronous chaotic encryption system
- One-way hash function construction based on the chaotic map with changeable-parameter
- scientific article; zbMATH DE number 2120360 (Why is no real title available?)
- Description of non-endomorphic maximum perfect ciphers with two-valued plaintext alphabet
- scientific article; zbMATH DE number 3937099 (Why is no real title available?)
- A linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing scheme
- Fundamentals of cryptology. A professional reference and interactive tutorial. Incl. 1 CD-ROM
- ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
- Analysis and improvement for the performance of Baptista's cryptographic scheme
- Cryptanalysis of ISO/IEC 9796-1
- On the security analysis of a Hopfield chaotic neural network-based image encryption algorithm
- An optimal multisecret threshold scheme construction
- Image encryption using \(q\)-deformed logistic map
- The identity problem of finitely generated bi-ideals
- scientific article; zbMATH DE number 6705391 (Why is no real title available?)
- Collision analysis of one kind of chaos-based hash function
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- A Classical Introduction to Cryptography
- Soft matrix product and soft cryptosystem
- The accessibility of an access structure
- A new cryptosystem using generalized Mersenne primes
- On the uniformity of distribution of the elliptic curve ElGamal signature.
- Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack
- Improvement of Tseng et al.'s authenticated encryption scheme with message linkages
- Secure group key agreement protocol based on chaotic hash
- scientific article; zbMATH DE number 810755 (Why is no real title available?)
- Computing shifts in 90/150 cellular automata sequences
- A key agreement protocol based on group actions
- On the power generator and its multivariate analogue
- A block encryption algorithm based on dynamic sequences of multiple chaotic systems
- Authenticated key agreement in dynamic peer groups
- Non-admissible tracks in Shamirs scheme
- Two-weight codes, graphs and orthogonal arrays
- A one-way function from thermodynamics and applications to cryptography
- Admissible tracks in Shamir's scheme
- Constructions for anonymous secret sharing schemes using combinatorial designs
- scientific article; zbMATH DE number 2221909 (Why is no real title available?)
- Cryptology. An introduction to the science of encoding, concealing and hiding
- Constructing strength three covering arrays with augmented annealing
- An optimal and scalable parallelization of the two-list algorithm for the subset-sum problem
- scientific article; zbMATH DE number 1731748 (Why is no real title available?)
- Improving the trade-off between storage and communication in broadcast encryption schemes
- Lower bounds for robust secret sharing schemes
- scientific article; zbMATH DE number 54007 (Why is no real title available?)
- How to fake an RSA signature by encoding modular root finding as a SAT problem
- On hidden sums compatible with a given block cipher diffusion layer
- Randomness in secret sharing and visual cryptography schemes
- Construction of one-way hash functions with increased key space using adaptive chaotic maps
- On secret sharing schemes
- Breaking an encryption scheme based on chaotic baker map
- scientific article; zbMATH DE number 854547 (Why is no real title available?)
- Practical cryptography. Algorithms and implementations using C++
- Applications of design theory for the constructions of MDS matrices for lightweight cryptography
- Neural cryptography with queries
- Joint compression and encryption using chaotically mutated Huffman trees
- Attacks on Shamir's `RSA for paranoids'
- Robust vector space secret sharing schemes
- Lossless chaotic color image cryptosystem based on DNA encryption and entropy
- Cryptanalysis of a spatiotemporal chaotic cryptosystem
- Application of Gray codes to the study of the theory of symbolic dynamics of unimodal maps
- On the distribution of the Diffie-Hellman pairs
- Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
- A CHAOS-BASED PSEUDO-RANDOM NUMBER GENERATOR AND ITS APPLICATION IN VOICE COMMUNICATIONS
- Cryptanalysis of a cryptographic scheme based on delayed chaotic neural networks
- A novel chaotic block cryptosystem based on iterating map with output-feedback
- Evolutionary computation based cryptanalysis: a first study
- New secret sharing scheme based on linear code
- scientific article; zbMATH DE number 3932944 (Why is no real title available?)
- A new spin on quantum cryptography: avoiding trapdoors and embracing public keys
- On the uniformity of distribution of the RSA pairs
- Systematic authentication codes using additive polynomials
- Cryptanalysis of a discrete chaotic cryptosystem using external key
- A cryptographic and coding-theoretic perspective on the global rules of cellular automata
- Cryptography. Individual freedom and secret codes
- A new chaotic cryptosystem
- Cryptanalysis of a chaotic secure communication system
- ElGamal cryptosystems on Boolean functions
- Cryptography. Principles and realization
- Encyclopedia of Cryptography and Security
- Cryptanalysis of an ergodic chaotic cipher
- scientific article; zbMATH DE number 2221548 (Why is no real title available?)
- Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map
- scientific article; zbMATH DE number 481378 (Why is no real title available?)
- Security aspects of the Cayley hash function using discrete Heisenberg group
- A more secure parallel keyed hash function based on chaotic neural network
- Watermarking ciphers
- Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps
- Color image encryption based on one-time keys and robust chaotic maps
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4839149)