scientific article; zbMATH DE number 854547

From MaRDI portal
Publication:4869527

zbMath0853.94001MaRDI QIDQ4869527

Bruce Schneier

Publication date: 11 March 1996


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

Arbitrated quantum signature scheme with continuous-variable coherent statesA homophonic DESEfficient construction of vote-tags to allow open objection to the tally in electronic electionsCryptanalysis and design of a three-party authenticated key exchange protocol using smart cardDouble image multi-encryption algorithm based on fractional chaotic time seriesError correcting codes, block designs, perfect secrecy and finite fieldsA provable authenticated key agreement protocol with privacy protection using smart card based on chaotic mapsA novel color image encryption algorithm based on spatial permutation and quantum chaotic mapReal-time image encryption using a low-complexity discrete 3D dual chaotic cipherChaos-based diffusion for highly autocorrelated data in encryption algorithmsA chaotic map-control-based and the plain image-related cryptosystemZeta functions, one-way functions, and pseudorandom number generators.Feedback shift registers, 2-adic span, and combiners with memoryA semantically secure public key cryptoscheme using bit-pair shadowsAttack and improvements of fair quantum blind signature schemesSecurity-aware optimization for ubiquitous computing systems with SEAT graph approachImage security system using recursive cellular automata substitutionCryptography based on chaotic random maps with position dependent weighting probabilitiesApplications of tripled chaotic maps in cryptographyCubic B-spline fuzzy transforms for an efficient and secure compression in wireless sensor networksCryptanalysis of an image encryption scheme based on a new total shuffling algorithmHash function based on piecewise nonlinear chaotic mapDesigning key-dependent chaotic S-box with larger key spaceColor image encryption based on one-time keys and robust chaotic mapsChaos-based secure satellite imagery cryptosystemA formal analysis of information disclosure in data exchangeFinding an internal state of RC4 stream cipherAttacks of simple block ciphers via efficient heuristicsGeneration of full cycles by a composition of NLFSRsA novel symmetrical cryptosystem based on discretized two-dimensional chaotic mapA novel edge based image steganography with \(2^k\) correction and Huffman encodingAn improvement of a cryptanalysis algorithmSecure collaborative supply chain planning and inverse optimization -- the JELS modelEnhanced key-establishing rates and efficiencies in fiber laser key distribution systemsFair and distributed peer-to-peer allocation of a common, refillable resourceWatermarking based on discrete wavelet transform and \(q\)-deformed chaotic mapA new key authentication scheme based on discrete logarithmsA lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networksFair exchange of valuable information: a generalised frameworkChaos-based cryptograph incorporated with \(S\)-box algebraic operationA \((t,n)\)-threshold scheme of multi-party quantum group signature with irregular quantum Fourier transformOn the security of the ping-pong protocolTweakable block ciphersQuantum protocols for untrusted computationsMultiparty quantum secret sharing of secure direct communicationSeveral cryptographic applications of \(\Sigma\)-protocolPrivacy preserving OLAP over distributed XML data: A theoretically-sound secure-multiparty-computation approachA new hybrid chaotic map and its application on image encryption and hidingEfficient non-repudiation multicast source authentication schemes.A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transformQuantum image encryption based on restricted geometric and color transformationsImproving the security of multiparty quantum secret splitting and quantum state sharingImproved Feistel-based ciphers for wireless sensor network securityGenerators of the equiprobable pseudorandom nonmaximal-length sequences based on linear-feedback shift registersClassification of signature-only signature modelsImage encryption with chaotically coupled chaotic mapsA new proxy signature scheme with revocationEfficient on-line electronic checksA more secure parallel keyed hash function based on chaotic neural networkChaotic behavior for the secret key of cryptographic systemOn the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precisionSteganography of capacity required using modulo operator for embedding secret imageOne-way hash function construction based on the chaotic map with changeable-parameterAn efficient entire chaos-based scheme for deniable authenticationCryptography using multiple one-dimensional chaotic mapsCryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operationsEncryption of covert information into multiple statistical distributionsParallel keyed hash function construction based on chaotic mapsA block cipher with dynamic S-boxes based on tent mapMeta-He digital signatures based on factoring and discrete logarithmsExtended substitution-diffusion based image cipher using chaotic standard mapSelf-shrinking chaotic stream ciphersAn anonymous key agreement protocol based on chaotic mapsAn efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic mapSynchronous consensus under hybrid process and link failuresSecure and self-stabilizing clock synchronization in sensor networksA chaos-based hash function with both modification detection and localization capabilitiesImage encryption using chaotic coupled map lattices with time-varying delaysA chaotic block cipher algorithm for image cryptosystemsProblems of cryptography as discrete optimization tasksOn quadratic approximations in block ciphersAlgorithms of information authentication for the automatic control systems on the basis of structures in finite vector spacesA countable and time-bound password-based user authentication scheme for the applications of electronic commerceThe ring authenticated encryption scheme-how to provide a clue wiselyNew algorithms and protocols for information authentication in automatic control systemsLinear complexity of generalized cyclotomic binary sequences of order 2A calculus for cryptographic protocols: The spi calculusA secure and scalable group key exchange systemAn application of index forms in cryptography\(s\)-partitions.How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.Topics in the theory of DNA computing.Analysis of security protocols as open systemsComputation of edit probabilities and edit distances for the A5-type keystream generatorA probabilistic cryptanalytic method for a time-variant permutation generatorPrimitives for authentication in process algebras.Inter-protocol interleaving attacks on some authentication and key distribution protocolsEfficient linear feedback shift registers with maximal periodA generator of pseudo-random numbers sequences with a very long periodPseudorandom permutation




This page was built for publication: