The following pages link to (Q5702555):
Displaying 50 items.
- Design of image cipher using Latin squares (Q278712) (← links)
- Quantum ramp secret sharing scheme and quantum operations (Q332521) (← links)
- On the relationships between perfect nonlinear functions and universal hash families (Q391979) (← links)
- On the complexity of the herding attack and some related attacks on hash functions (Q420639) (← links)
- Observing biases in the state: case studies with Trivium and Trivia-SC (Q510484) (← links)
- On the security of Y-00 under fast correlation and other attacks on the key (Q620794) (← links)
- Sleeping on the job: energy-efficient and robust broadcast for radio networks (Q644799) (← links)
- Three-level secret sharing schemes from the twisted cubic (Q712244) (← links)
- A steganographic method based on tetris games (Q726479) (← links)
- Perfect hash families of strength three with three rows from varieties on finite projective geometries (Q887417) (← links)
- A survey of some applications of finite fields (Q908045) (← links)
- Pairing-based cryptography on elliptic curves (Q1616164) (← links)
- Ideal ramp schemes and related combinatorial objects (Q1685978) (← links)
- Combinatorial repairability for threshold schemes (Q1692160) (← links)
- Message authentication based on cryptographically secure CRC without polynomial irreducibility test (Q1696144) (← links)
- Image encryption using the chaotic Josephus matrix (Q1718802) (← links)
- From enumerating to generating: a linear time algorithm for generating 2D lattice paths with a given number of turns (Q1736650) (← links)
- Investigating results and performance of search and construction algorithms for word-based LFSRs, \(\sigma\)-LFSRs (Q1752448) (← links)
- A fast parallel sparse polynomial GCD algorithm (Q1994882) (← links)
- Quantum strongly secure ramp secret sharing (Q2018190) (← links)
- Multi-value private information retrieval with colluding databases via trace functions (Q2053906) (← links)
- Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer (Q2054031) (← links)
- A new cryptosystem based on a twisted Hessian curve \(H^4_{a,d}\) (Q2089214) (← links)
- Little extension of Euler's criterion for quadratic residue (Q2107681) (← links)
- Shrinking generators based on \(\sigma \)-LFSRs (Q2197462) (← links)
- Message randomization and strong security in quantum stabilizer-based secret sharing for classical secrets (Q2200519) (← links)
- When lagged Fibonacci generators jump (Q2322871) (← links)
- Prêt à voter with Paillier encryption (Q2389798) (← links)
- Theoretically extensible quantum digital signature with starlike cluster states (Q2411553) (← links)
- RFID authentication efficient proactive information security within computational security (Q2429725) (← links)
- Classical access structures of ramp secret sharing based on quantum stabilizer codes (Q2677549) (← links)
- Ramp scheme based on CRT for polynomial ring over finite field (Q2699255) (← links)
- Linear Cryptanalysis of the PP-1 and PP-2 Block Ciphers (Q2945377) (← links)
- A verifiable secret sharing scheme using non-abelian groups (Q2975248) (← links)
- A Simple Generalization of the ElGamal Cryptosystem to Non-Abelian Groups II (Q3145453) (← links)
- (Q3383968) (← links)
- Basics of Secrecy Coding (Q3462200) (← links)
- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels (Q3503868) (← links)
- A Critical Analysis and Improvement of AACS Drive-Host Authentication (Q3511150) (← links)
- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures (Q3600329) (← links)
- (Q4970461) (← links)
- On Solving a Generalized Chinese Remainder Theorem in the Presence of Remainder Errors (Q5014836) (← links)
- A DSA-like digital signature protocol (Q5043927) (← links)
- Cryptography using generalized Fibonacci matrices with Affine-Hill cipher (Q5059569) (← links)
- Insecure primitive elements in an ElGamal signature protocol (Q5069670) (← links)
- A Chaotic Circuit for Producing Gaussian Random Numbers (Q5116644) (← links)
- The Design of Maple's Sum-of-Products and POLY Data Structures for Representing Mathematical Objects (Q5178930) (← links)
- Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes (Q5502761) (← links)
- (Q6151432) (← links)
- DEFAULT: cipher level resistance against differential fault attack (Q6157514) (← links)