The following pages link to (Q4839149):
Displayed 50 items.
- Non-admissible tracks in Shamirs scheme (Q549265) (← links)
- A more secure parallel keyed hash function based on chaotic neural network (Q551116) (← links)
- Cryptanalysis of a discrete-time synchronous chaotic encryption system (Q552769) (← links)
- Cryptanalysis of a cryptographic scheme based on delayed chaotic neural networks (Q600509) (← links)
- Observer-based hyperchaos synchronization in cascaded discrete-time systems (Q600544) (← links)
- Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map (Q601471) (← links)
- Applications of tripled chaotic maps in cryptography (Q602178) (← links)
- Analysis and improvement of a chaos-based image encryption algorithm (Q602218) (← links)
- A novel chaotic block cryptosystem based on iterating map with output-feedback (Q602350) (← links)
- Cryptanalysis of a spatiotemporal chaotic cryptosystem (Q602500) (← links)
- Hash function based on piecewise nonlinear chaotic map (Q603663) (← links)
- Color image encryption based on one-time keys and robust chaotic maps (Q604024) (← links)
- Admissible tracks in Shamir's scheme (Q609362) (← links)
- A fast image encryption scheme based on chaotic standard map (Q637406) (← links)
- Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem (Q641393) (← links)
- Cryptanalysis of a new image encryption algorithm based on hyper-chaos (Q641466) (← links)
- Authenticated key agreement in dynamic peer groups (Q703558) (← links)
- Parallel keyed hash function construction based on chaotic maps (Q716925) (← links)
- A block encryption algorithm based on dynamic sequences of multiple chaotic systems (Q718851) (← links)
- A chaos-based hash function with both modification detection and localization capabilities (Q720114) (← links)
- Joint compression and encryption using chaotically mutated Huffman trees (Q720208) (← links)
- A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis (Q720254) (← links)
- A fast image encryption and authentication scheme based on chaotic maps (Q720260) (← links)
- An optimal and scalable parallelization of the two-list algorithm for the subset-sum problem (Q852950) (← links)
- Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps (Q868085) (← links)
- Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers (Q870119) (← links)
- Constructions for anonymous secret sharing schemes using combinatorial designs (Q871669) (← links)
- Constructing strength three covering arrays with augmented annealing (Q924952) (← links)
- A new chaotic cryptosystem (Q943310) (← links)
- Breaking an encryption scheme based on chaotic baker map (Q973548) (← links)
- Heterogeneous chaotic systems based cryptography (Q997666) (← links)
- Evolutionary computation based cryptanalysis: a first study (Q999604) (← links)
- Systematic authentication codes using additive polynomials (Q1009061) (← links)
- Cryptanalysis and improvement on a cryptosystem based on a chaotic map (Q1029904) (← links)
- How to fake an RSA signature by encoding modular root finding as a SAT problem (Q1408375) (← links)
- Cryptanalysis of a discrete chaotic cryptosystem using external key (Q1414525) (← links)
- Design the hyperchaotic cryptosystems via the Gerschgorin theorem (Q1433590) (← links)
- On the distribution of the Diffie-Hellman pairs (Q1609391) (← links)
- New secret sharing scheme based on linear code (Q1764386) (← links)
- Improvement of Tseng et al.'s authenticated encryption scheme with message linkages (Q1765881) (← links)
- Breaking projective chaos synchronization secure communication using filtering and generalized synchronization (Q1772887) (← links)
- One-way hash function construction based on the chaotic map with changeable-parameter (Q1775681) (← links)
- Linear broadcast encryption schemes (Q1811106) (← links)
- Generation of key predistribution schemes using secret sharing schemes (Q1811107) (← links)
- Randomness in secret sharing and visual cryptography schemes (Q1826638) (← links)
- Cryptanalysis of a chaotic secure communication system (Q1852614) (← links)
- Lower bounds on the information rate of secret sharing schemes with homogeneous access structure. (Q1853095) (← links)
- Discrete chaotic cryptography using external key (Q1860871) (← links)
- On the uniformity of distribution of the elliptic curve ElGamal signature. (Q1867472) (← links)
- Computing shifts in 90/150 cellular automata sequences (Q1870028) (← links)