scientific article; zbMATH DE number 854547
From MaRDI portal
Publication:4869527
zbMath0853.94001MaRDI QIDQ4869527
Publication date: 11 March 1996
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01)
Related Items (only showing first 100 items - show all)
Arbitrated quantum signature scheme with continuous-variable coherent states ⋮ A homophonic DES ⋮ Efficient construction of vote-tags to allow open objection to the tally in electronic elections ⋮ Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card ⋮ Double image multi-encryption algorithm based on fractional chaotic time series ⋮ Error correcting codes, block designs, perfect secrecy and finite fields ⋮ A provable authenticated key agreement protocol with privacy protection using smart card based on chaotic maps ⋮ A novel color image encryption algorithm based on spatial permutation and quantum chaotic map ⋮ Real-time image encryption using a low-complexity discrete 3D dual chaotic cipher ⋮ Chaos-based diffusion for highly autocorrelated data in encryption algorithms ⋮ A chaotic map-control-based and the plain image-related cryptosystem ⋮ Zeta functions, one-way functions, and pseudorandom number generators. ⋮ Feedback shift registers, 2-adic span, and combiners with memory ⋮ A semantically secure public key cryptoscheme using bit-pair shadows ⋮ Attack and improvements of fair quantum blind signature schemes ⋮ Security-aware optimization for ubiquitous computing systems with SEAT graph approach ⋮ Image security system using recursive cellular automata substitution ⋮ Cryptography based on chaotic random maps with position dependent weighting probabilities ⋮ Applications of tripled chaotic maps in cryptography ⋮ Cubic B-spline fuzzy transforms for an efficient and secure compression in wireless sensor networks ⋮ Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm ⋮ Hash function based on piecewise nonlinear chaotic map ⋮ Designing key-dependent chaotic S-box with larger key space ⋮ Color image encryption based on one-time keys and robust chaotic maps ⋮ Chaos-based secure satellite imagery cryptosystem ⋮ A formal analysis of information disclosure in data exchange ⋮ Finding an internal state of RC4 stream cipher ⋮ Attacks of simple block ciphers via efficient heuristics ⋮ Generation of full cycles by a composition of NLFSRs ⋮ A novel symmetrical cryptosystem based on discretized two-dimensional chaotic map ⋮ A novel edge based image steganography with \(2^k\) correction and Huffman encoding ⋮ An improvement of a cryptanalysis algorithm ⋮ Secure collaborative supply chain planning and inverse optimization -- the JELS model ⋮ Enhanced key-establishing rates and efficiencies in fiber laser key distribution systems ⋮ Fair and distributed peer-to-peer allocation of a common, refillable resource ⋮ Watermarking based on discrete wavelet transform and \(q\)-deformed chaotic map ⋮ A new key authentication scheme based on discrete logarithms ⋮ A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks ⋮ Fair exchange of valuable information: a generalised framework ⋮ Chaos-based cryptograph incorporated with \(S\)-box algebraic operation ⋮ A \((t,n)\)-threshold scheme of multi-party quantum group signature with irregular quantum Fourier transform ⋮ On the security of the ping-pong protocol ⋮ Tweakable block ciphers ⋮ Quantum protocols for untrusted computations ⋮ Multiparty quantum secret sharing of secure direct communication ⋮ Several cryptographic applications of \(\Sigma\)-protocol ⋮ Privacy preserving OLAP over distributed XML data: A theoretically-sound secure-multiparty-computation approach ⋮ A new hybrid chaotic map and its application on image encryption and hiding ⋮ Efficient non-repudiation multicast source authentication schemes. ⋮ A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform ⋮ Quantum image encryption based on restricted geometric and color transformations ⋮ Improving the security of multiparty quantum secret splitting and quantum state sharing ⋮ Improved Feistel-based ciphers for wireless sensor network security ⋮ Generators of the equiprobable pseudorandom nonmaximal-length sequences based on linear-feedback shift registers ⋮ Classification of signature-only signature models ⋮ Image encryption with chaotically coupled chaotic maps ⋮ A new proxy signature scheme with revocation ⋮ Efficient on-line electronic checks ⋮ A more secure parallel keyed hash function based on chaotic neural network ⋮ Chaotic behavior for the secret key of cryptographic system ⋮ On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision ⋮ Steganography of capacity required using modulo operator for embedding secret image ⋮ One-way hash function construction based on the chaotic map with changeable-parameter ⋮ An efficient entire chaos-based scheme for deniable authentication ⋮ Cryptography using multiple one-dimensional chaotic maps ⋮ Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations ⋮ Encryption of covert information into multiple statistical distributions ⋮ Parallel keyed hash function construction based on chaotic maps ⋮ A block cipher with dynamic S-boxes based on tent map ⋮ Meta-He digital signatures based on factoring and discrete logarithms ⋮ Extended substitution-diffusion based image cipher using chaotic standard map ⋮ Self-shrinking chaotic stream ciphers ⋮ An anonymous key agreement protocol based on chaotic maps ⋮ An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map ⋮ Synchronous consensus under hybrid process and link failures ⋮ Secure and self-stabilizing clock synchronization in sensor networks ⋮ A chaos-based hash function with both modification detection and localization capabilities ⋮ Image encryption using chaotic coupled map lattices with time-varying delays ⋮ A chaotic block cipher algorithm for image cryptosystems ⋮ Problems of cryptography as discrete optimization tasks ⋮ On quadratic approximations in block ciphers ⋮ Algorithms of information authentication for the automatic control systems on the basis of structures in finite vector spaces ⋮ A countable and time-bound password-based user authentication scheme for the applications of electronic commerce ⋮ The ring authenticated encryption scheme-how to provide a clue wisely ⋮ New algorithms and protocols for information authentication in automatic control systems ⋮ Linear complexity of generalized cyclotomic binary sequences of order 2 ⋮ A calculus for cryptographic protocols: The spi calculus ⋮ A secure and scalable group key exchange system ⋮ An application of index forms in cryptography ⋮ \(s\)-partitions. ⋮ How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. ⋮ Topics in the theory of DNA computing. ⋮ Analysis of security protocols as open systems ⋮ Computation of edit probabilities and edit distances for the A5-type keystream generator ⋮ A probabilistic cryptanalytic method for a time-variant permutation generator ⋮ Primitives for authentication in process algebras. ⋮ Inter-protocol interleaving attacks on some authentication and key distribution protocols ⋮ Efficient linear feedback shift registers with maximal period ⋮ A generator of pseudo-random numbers sequences with a very long period ⋮ Pseudorandom permutation
This page was built for publication: