Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

security superiorities

biblio

Visible to the public ID-Based Signcryption Scheme Using Extended Chaotic Maps

Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
  • cryptosystems
  • security superiorities
  • Resiliency
  • public-key cryptography
  • public key cryptography
  • pubcrawl
  • Metrics
  • identity-based signcryption scheme
  • Identity-based signcryption
  • ID-based signcryption scheme
  • extended chaotic maps
  • encryption
  • ECM-IBSC scheme
  • Algorithm design and analysis
  • Computation efficiency
  • computation efficiencies
  • composability
  • Chebyshev approximation
  • chaotic public-key cryptography
  • Chaotic maps
  • chaotic cryptography
  • chaotic communication
  • chaos-based discrete logarithm problem
  • chaos
  • CDL problem

Terms of Use  |  ©2023. CPS-VO