Multivariate symmetric cryptography with 2-dimesion chaotic disturbation
暂无分享,去创建一个
[1] Shi Lei. Improved image encryption algorithm based on Henon hyperchaotic system , 2011 .
[2] Hideki Imai,et al. Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption , 1988, EUROCRYPT.
[3] Yang Yang. Design and Analysis of Multivariate Hash Function , 2011 .
[4] Fan Jiu-lun. An Extended Chaotic Sequence Generating Method , 2007 .
[5] Shuhong Gao,et al. Multivariate public key cryptosystems from diophantine equations , 2013, Des. Codes Cryptogr..
[6] Tsuyoshi Takagi,et al. General Fault Attacks on Multivariate Public Key Cryptosystems , 2011, PQCrypto.
[7] D. R. Frey,et al. Chaotic digital encoding: an approach to secure communication , 1993 .
[8] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[9] E. Lorenz. Deterministic nonperiodic flow , 1963 .
[10] Jintai Ding,et al. Secure Electronic Voting , 2006, Advances in Information Security.
[11] Ming Tang,et al. Extended multivariate public key cryptosystems with secure encryption function , 2011, Science China Information Sciences.
[12] M. Hénon,et al. A two-dimensional mapping with a strange attractor , 1976 .
[13] Tian Li. A MPKC Signature Scheme Based on Mixing of MI and TPM , 2012 .
[14] Christopher Wolf,et al. Multivariate quadratic polynomials in public key cryptography , 2005, IACR Cryptol. ePrint Arch..
[15] Zhang Min. An Improved Scheme of the "Medium-Field" Multivariate Cryptosystem , 2009 .
[16] Predrag Cvitanović. A Two-dimensional Mapping with a Strange Attractor , 2017 .