An improved public key encryption algorithm based on Chebyshev polynomials

被引:0
|
作者
Sun, Jinhui [1 ]
Zhao, Geng [1 ]
Li, Xufei [1 ]
机构
[1] School of Communication Engineering, Xidian University, Xi'an 710071, 13439925967, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:864 / 870
相关论文
共 50 条
  • [31] Public key encryption algorithm on braid groups
    Department of Information Security, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
    Ruan Jian Xue Bao, 2007, 3 (722-729): : 722 - 729
  • [32] An Encryption Algorithm Based on Public-Key Cryptosystems for Vector Map
    Tan, Tao
    Zhang, Liming
    Liu, Shuaikang
    Wang, Lei
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [33] Research on encryption algorithm based on the Chebyshev neural network
    Liu Feng
    Luo Li
    Liu Jin-zhou
    NANOTECHNOLOGY AND PRECISION ENGINEERING, PTS 1 AND 2, 2013, 662 : 884 - 886
  • [34] Public Key Encryption of Images and Videos in Real Time Using Chebyshev Maps
    Ganesan, K.
    Singh, Ishan
    Narain, Mansi
    COMPUTER GRAPHICS, IMAGING AND VISUALISATION - MODERN TECHNIQUES AND APPLICATIONS, PROCEEDINGS, 2008, : 211 - 216
  • [35] Improved Encryption Algorithm for Public Wireless Network
    Khosa, Christopher
    Mathonsi, Topside
    du Plessis, Deon
    Tshilongamulenzhe, Tshimangadzo
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2024, 15 (02) : 233 - 244
  • [36] Security of Public-Key Cryptosystems Based on Chebyshev Polynomials over the Residue Ring Z/pkZ
    Yoshioka, Daisaburo
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [37] Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography
    Zhao, Tieyu
    Ran, Qiwen
    Yuan, Lin
    Chi, Yingying
    Ma, Jing
    OPTICS AND LASERS IN ENGINEERING, 2015, 72 : 12 - 17
  • [38] A Novel Video Encryption Algorithm-Based On Speaker Voice As The Public Key
    Al-Hazaimeh, Obaida M.
    Alhindawi, Nouh
    Otoum, Nesreen A.
    2014 IEEE INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING, 2014, : 180 - 184
  • [39] PROOF CHECKING THE RSA PUBLIC KEY ENCRYPTION ALGORITHM
    BOYER, RS
    MOORE, JS
    AMERICAN MATHEMATICAL MONTHLY, 1984, 91 (03): : 181 - 189
  • [40] A fast chaotic data encryption algorithm based on Chebyshev map
    Fu Chong
    Li Hui
    ICCSE'2006: Proceedings of the First International Conference on Computer Science & Education: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2006, : 574 - 578