4.5 Article

BREAKING A CHAOTIC CRYPTOGRAPHIC SCHEME BASED ON COMPOSITION MAPS

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

On the security defects of an image encryption scheme

Chengqing Li et al.

IMAGE AND VISION COMPUTING (2009)

Article Engineering, Electrical & Electronic

Embedding Compression in Chaos-Based Cryptography

Kwok-Wo Wong et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS (2008)

Article Mathematics, Interdisciplinary Applications

Chaotic cryptographic scheme based on composition maps

Sohrab Behnia et al.

INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS (2008)

Article Computer Science, Software Engineering

Cryptanalysis of the RCES/RSES image encryption scheme

Shujun Li et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2008)

Article Engineering, Electrical & Electronic

A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks

Shujun Li et al.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2008)

Article Physics, Multidisciplinary

Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations

Chengqing Li et al.

PHYSICS LETTERS A (2007)

Article Computer Science, Artificial Intelligence

Image encryption using chaotic logistic map

N. K. Pareek et al.

IMAGE AND VISION COMPUTING (2006)

Review Mathematics, Interdisciplinary Applications

Some basic cryptographic requirements for chaos-based cryptosystems

Gonzalo Alvarez et al.

INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS (2006)

Article Engineering, Electrical & Electronic

Improving the security of a dynamic look-up table based chaotic cryptosystem

Di Xiao et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS (2006)

Article Mathematics, Interdisciplinary Applications

Return-map cryptanalysis revisited

Shujun Li et al.

INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS (2006)

Article Physics, Multidisciplinary

Breaking an encryption scheme based on chaotic baker map

G Alvarez et al.

PHYSICS LETTERS A (2006)

Article Engineering, Electrical & Electronic

Cryptanalysis of a data security protection scheme for VoIP

CQ Li et al.

IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING (2006)

Article Computer Science, Software Engineering

On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)

CQ Li et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2006)

Article Physics, Multidisciplinary

Security analysis of a chaos-based image encryption algorithm

SG Lian et al.

PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS (2005)

Article Mathematics, Interdisciplinary Applications

Cryptanalysis of observer based discrete-time chaotic encryption schemes

E Solak

INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS (2005)

Article Computer Science, Artificial Intelligence

Image and video encryption using SCAN patterns

SS Maniccam et al.

PATTERN RECOGNITION (2004)

Article Engineering, Electrical & Electronic

On the security of the Yi-Tan-Siew chaotic cipher

SJ Li et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS (2004)

Article Mathematics, Interdisciplinary Applications

A symmetric image encryption scheme based on 3D chaotic cat maps

GR Chen et al.

CHAOS SOLITONS & FRACTALS (2004)

Article Physics, Multidisciplinary

Cryptanalysis of dynamic look-up table based chaotic cryptosystems

G Alvarez et al.

PHYSICS LETTERS A (2004)

Article Mathematics, Interdisciplinary Applications

Problems with a probabilistic encryption scheme based on chaotic systems

SJ Li et al.

INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS (2003)