Journal
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS
Volume 53, Issue 6, Pages 502-506Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCSII.2006.875336
Keywords
chaotic cryptography; cryptanalysis; ergodicity; hash
Categories
Ask authors/readers for more resources
In this brief, we analyze the cause of vulnerability of the original dynamic look-up table based chaotic encryption scheme in detail, and then propose the corresponding enhancement measures. Theoretical analysis and computer simulation indicate that the modified scheme is more secure than the original one.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available