The following pages link to (Q2770462):
Displaying 50 items.
- On multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fields (Q268465) (← links)
- Practical cryptanalysis of ISO 9796-2 and EMV signatures (Q315558) (← links)
- Study on the security of the authentication scheme with key recycling in QKD (Q331437) (← links)
- Improved Markov chain Monte Carlo method for cryptanalysis substitution-transposition cipher (Q350295) (← links)
- New fault attacks using Jacobi symbol and application to regular right-to-left algorithms (Q407590) (← links)
- A public key cryptosystem based on three new provable problems (Q418738) (← links)
- Provably secure three-party password-based authenticated key exchange protocol (Q425526) (← links)
- Some lattice attacks on DSA and ECDSA (Q429782) (← links)
- A geometric protocol for cryptography with cards (Q488255) (← links)
- A case study in almost-perfect security for unconditionally secure communication (Q517272) (← links)
- Self-generated-certificate public key encryption without pairing and its application (Q545362) (← links)
- Designing key-dependent chaotic S-box with larger key space (Q603981) (← links)
- Chaos-based secure satellite imagery cryptosystem (Q604098) (← links)
- A note on Yao's theorem about pseudo-random generators (Q662183) (← links)
- A secure scheme to share secret color images (Q709824) (← links)
- Decrypting classical cipher text using Markov chain Monte Carlo (Q746218) (← links)
- Quantum hashing via \(\epsilon\)-universal hashing constructions and classical fingerprinting (Q748223) (← links)
- Type systems equivalent to data-flow analyses for imperative languages (Q860844) (← links)
- Linear dimensionality reduction by maximizing the Chernoff distance in the transformed space (Q936440) (← links)
- A multisecret sharing scheme for color images based on cellular automata (Q955248) (← links)
- Garden of Eden configurations for 2-D cellular automata with rule 2460 N (Q991896) (← links)
- Distortion-free secret image sharing mechanism using modulus operator (Q1010099) (← links)
- Domain extender for collision resistant hash functions: Improving upon Merkle-Damgård iteration (Q1028435) (← links)
- Chaotic image encryption design using Tompkins-Paige algorithm (Q1036462) (← links)
- Cryptosystems based on semi-distributive algebras (Q1042600) (← links)
- Image encryption using random bit sequence based on chaotic maps (Q1639784) (← links)
- Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion (Q1681758) (← links)
- Quantum identity authentication with single photon (Q1702207) (← links)
- A new improving quantum secret sharing scheme (Q1705116) (← links)
- Attacks to some verifiable multi-secret sharing schemes and two improved schemes (Q1750542) (← links)
- Generalized nonlinearity of \(S\)-boxes (Q1783710) (← links)
- Quantum secure two-party computation for set intersection with rational players (Q1993844) (← links)
- Universal quantum encryption for quantum signature using the swap test (Q1994679) (← links)
- Secret sharing schemes based on graphical codes (Q2016393) (← links)
- Image cipher applications using the elliptical curve and chaos (Q2023651) (← links)
- Dynamic multi-party quantum key agreement protocol based on commutative encryption (Q2090074) (← links)
- Multi-party quantum key agreement protocol for detection of collusive attacks in each sub-circle segment by headers (Q2165335) (← links)
- An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem (Q2318572) (← links)
- Application based construction and optimization of substitution boxes over 2D mixed chaotic maps (Q2322220) (← links)
- Cheating-immune secret sharing schemes from codes and cumulative arrays (Q2392682) (← links)
- Assessing the effectiveness of artificial neural networks on problems related to elliptic curve cryptography (Q2470209) (← links)
- New efficient and practical verifiable multi-secret sharing schemes (Q2482434) (← links)
- Affinity of permutations of \(\mathbb F_{2}^{n}\) (Q2489926) (← links)
- Some observations on the theory of cryptographic hash functions (Q2491271) (← links)
- The GN-authenticated key agreement (Q2572038) (← links)
- A secret sharing scheme based on cellular automata (Q2573599) (← links)
- How to repair the Hill cipher (Q2644501) (← links)
- Polynomial representations of the Diffie-Hellman mapping (Q2730746) (← links)
- Robust biometric-based three-party authenticated key establishment protocols (Q2995506) (← links)
- Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols (Q3073713) (← links)