Hybrid Publicly Verifiable Authenticated Encryption Scheme Based on Chaotic Maps and Factoring Problems
暂无分享,去创建一个
[1] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[2] Yuliang Zheng,et al. Signcryption and Its Applications in Efficient Public Key Solutions , 1997, ISW.
[3] Eddie Shahril Ismail,et al. New Cryptosystem Using Multiple Cryptographic Assumptions , 2011 .
[4] Min-Shiang Hwang,et al. A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms , 2017, Int. J. Netw. Secur..
[5] K. Wong,et al. A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .
[6] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[7] Ángel Martín del Rey,et al. A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes , 2008, Int. J. Netw. Secur..
[8] Chenggen Quan,et al. Optical color image encryption based on Arnold transform and interference method , 2009 .
[9] Wen-Chung Kuo,et al. A new digital signature scheme based on chaotic maps , 2013, Nonlinear dynamics.
[10] Yu Fu,et al. Color image encryption based on interference and virtual optics , 2010 .
[11] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[12] Zhenfeng Zhang,et al. Chaotic encryption algorithm based on alternant of stream cipher and block cipher , 2011 .
[13] Djiby Sow,et al. A Factoring and Discrete Logarithm based Cryptosystem , 2012, ArXiv.
[14] Tambe,et al. Driving systems with chaotic signals. , 1992, Physical review. A, Atomic, molecular, and optical physics.
[15] Robert A. J. Matthews,et al. On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.
[16] Tzonelih Hwang,et al. Publicly verifiable authenticated encryption , 2003 .
[17] Min-Shiang Hwang,et al. A new convertible authenticated encryption scheme with message linkages , 2007, Comput. Electr. Eng..
[18] Hyunsoo Yoon,et al. New Modular Multiplication Algorithms for Fast Modular Exponentiation , 1996, EUROCRYPT.
[19] Aboul Ella Hassanien,et al. A Fast and Secure One-Way Hash Function , 2011, FGIT-SecTech.
[20] Chin-Chen Chang,et al. Authenticated encryption scheme without using a one way function , 1995 .
[21] Rastislav Lukac,et al. Efficient encryption of wavelet-based coded color images , 2005, Pattern Recognit..
[22] Patrick Horster,et al. Authenticated encryption schemes with low communication costs , 1994 .
[23] Ljupco Kocarev,et al. Public-key encryption based on Chebyshev maps , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[24] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[25] Cheng-Chi Lee,et al. A New Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem , 2009, Int. J. Found. Comput. Sci..
[26] Daomu Zhao,et al. Optical color image encryption with redefined fractional Hartley transform , 2010 .