The following pages link to (Q4839149):
Displaying 50 items.
- A new cryptosystem using generalized Mersenne primes (Q258874) (← links)
- Two-weight codes, graphs and orthogonal arrays (Q285232) (← links)
- Lower bounds for robust secret sharing schemes (Q287197) (← links)
- On secret sharing schemes (Q293172) (← links)
- Robust vector space secret sharing schemes (Q293422) (← links)
- Attacks on Shamir's `RSA for paranoids' (Q293447) (← links)
- Public key protocols over the ring \(E_{p}^{(m)}\) (Q340183) (← links)
- On the power generator and its multivariate analogue (Q413475) (← links)
- Non-admissible tracks in Shamirs scheme (Q549265) (← links)
- A more secure parallel keyed hash function based on chaotic neural network (Q551116) (← links)
- Cryptanalysis of a discrete-time synchronous chaotic encryption system (Q552769) (← links)
- Cryptanalysis of a cryptographic scheme based on delayed chaotic neural networks (Q600509) (← links)
- Observer-based hyperchaos synchronization in cascaded discrete-time systems (Q600544) (← links)
- Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map (Q601471) (← links)
- Applications of tripled chaotic maps in cryptography (Q602178) (← links)
- Analysis and improvement of a chaos-based image encryption algorithm (Q602218) (← links)
- A novel chaotic block cryptosystem based on iterating map with output-feedback (Q602350) (← links)
- Cryptanalysis of a spatiotemporal chaotic cryptosystem (Q602500) (← links)
- Hash function based on piecewise nonlinear chaotic map (Q603663) (← links)
- Color image encryption based on one-time keys and robust chaotic maps (Q604024) (← links)
- Admissible tracks in Shamir's scheme (Q609362) (← links)
- A fast image encryption scheme based on chaotic standard map (Q637406) (← links)
- Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem (Q641393) (← links)
- Cryptanalysis of a new image encryption algorithm based on hyper-chaos (Q641466) (← links)
- Authenticated key agreement in dynamic peer groups (Q703558) (← links)
- Parallel keyed hash function construction based on chaotic maps (Q716925) (← links)
- A block encryption algorithm based on dynamic sequences of multiple chaotic systems (Q718851) (← links)
- A chaos-based hash function with both modification detection and localization capabilities (Q720114) (← links)
- Joint compression and encryption using chaotically mutated Huffman trees (Q720208) (← links)
- A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis (Q720254) (← links)
- A fast image encryption and authentication scheme based on chaotic maps (Q720260) (← links)
- An optimal and scalable parallelization of the two-list algorithm for the subset-sum problem (Q852950) (← links)
- Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps (Q868085) (← links)
- Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers (Q870119) (← links)
- Constructions for anonymous secret sharing schemes using combinatorial designs (Q871669) (← links)
- Constructing strength three covering arrays with augmented annealing (Q924952) (← links)
- A new chaotic cryptosystem (Q943310) (← links)
- Breaking an encryption scheme based on chaotic baker map (Q973548) (← links)
- Heterogeneous chaotic systems based cryptography (Q997666) (← links)
- Evolutionary computation based cryptanalysis: a first study (Q999604) (← links)
- Systematic authentication codes using additive polynomials (Q1009061) (← links)
- Cryptanalysis and improvement on a cryptosystem based on a chaotic map (Q1029904) (← links)
- How to fake an RSA signature by encoding modular root finding as a SAT problem (Q1408375) (← links)
- Cryptanalysis of a discrete chaotic cryptosystem using external key (Q1414525) (← links)
- Design the hyperchaotic cryptosystems via the Gerschgorin theorem (Q1433590) (← links)
- On the distribution of the Diffie-Hellman pairs (Q1609391) (← links)
- On hidden sums compatible with a given block cipher diffusion layer (Q1625795) (← links)
- Lossless chaotic color image cryptosystem based on DNA encryption and entropy (Q1637239) (← links)
- New secret sharing scheme based on linear code (Q1764386) (← links)
- Improvement of Tseng et al.'s authenticated encryption scheme with message linkages (Q1765881) (← links)