Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring \(Z_{N}\)
From MaRDI portal
Publication:429602
DOI10.1016/j.ins.2011.07.008zbMath1272.94021OpenAlexW2086853779WikidataQ115042089 ScholiaQ115042089MaRDI QIDQ429602
Tao Xiang, Hongying Zheng, Fei Chen, Xiaofeng Liao
Publication date: 20 June 2012
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2011.07.008
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Color image encryption based on one-time keys and robust chaotic maps
- Theory and practice of chaotic cryptography
- An anonymous key agreement protocol based on chaotic maps
- An improved key agreement protocol based on chaos
- New stream cipher designs. The eSTREAM finalists
- Finding the differential characteristics of block ciphers with neural networks
- A criterion for primitiveness of polynomials over \(\mathbb{Z}{}/(2^ d)\)
- Maximal period polynomials over \(\mathbb{Z}/(p^ d)\)
- The stability theory of stream ciphers
- Binary sequences derived from ML-sequences over rings. I: Periods and minimal polynomials
- A symmetric image encryption scheme based on 3D chaotic cat maps
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
- Public-key encryption based on Chebyshev polynomials
- Secure group key agreement protocol based on chaotic hash
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Selective image encryption using a spatiotemporal chaotic system
- Elliptic Curve Cryptosystems
- Linear Complexity and Random Sequences
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Security of public-key cryptosystems based on Chebyshev polynomials
- Chaotic block ciphers: from theory to practical algorithms
- On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$
- Use of chaotic dynamical systems in cryptography
This page was built for publication: Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring \(Z_{N}\)