An improved public key encryption algorithm based on Chebyshev polynomials

被引:0
|
作者
Sun, Jinhui [1 ]
Zhao, Geng [1 ]
Li, Xufei [1 ]
机构
[1] School of Communication Engineering, Xidian University, Xi'an 710071, 13439925967, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:864 / 870
相关论文
共 50 条
  • [41] Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover
    Gupta, Manish
    Gupta, Kamlesh Kumar
    Shukla, Piyush Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (25) : 33843 - 33863
  • [42] Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover
    Manish Gupta
    Kamlesh Kumar Gupta
    Piyush Kumar Shukla
    Multimedia Tools and Applications, 2021, 80 : 33843 - 33863
  • [43] Improved Homomorphic String Bits Encryption Public-key Cryptosystem based on LWE
    Bai Jian
    Yang Yatao
    Li Zichen
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 355 - 358
  • [44] Combining Public Key Encryption with Keyword Search and Public Key Encryption
    Zhang, Rui
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05) : 888 - 896
  • [45] Key Space of Cryptosystem based on Chebyshev Polynomials over Finite Field
    Li, Zhihui
    Cui, Yidong
    Jin, Yuehui
    Xu, Huimin
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [46] A New Encryption Algorithm Based on Fibonacci Polynomials and Matrices
    Diskaya, Orhan
    Avaroglu, Erdinc
    Menken, Hamza
    Emsal, Ahmet
    TRAITEMENT DU SIGNAL, 2022, 39 (05) : 1453 - 1462
  • [47] New and Improved Constructions for Partially Equivocable Public Key Encryption
    Libert, Benoit
    Passelegue, Alain
    Riahinia, Mahshid
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 197 - 219
  • [48] Key agreement protocol based on Chebyshev polynomials for wireless sensor network
    Chen, Yanbin
    Xushuai, Jianni
    Jiang, Qiongxi
    Gong, Lihua
    Journal of Computational Information Systems, 2014, 10 (02): : 589 - 594
  • [49] Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption
    Santoso, Bagus
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 : 340 - 359
  • [50] A novel image encryption algorithm based on improved key selection and digital chaotic map
    Xiang, Hongyue
    Liu, Lingfeng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (14) : 22135 - 22162