-
1
-
-
33750542126
-
Some basic cryptographic requirements for chaos-based cryptosystems
-
8
-
G. Alvarez S. Li 2006 Some basic cryptographic requirements for chaos-based cryptosystems Int. J. Bifurc. Chaos 16 8 2129 2151
-
(2006)
Int. J. Bifurc. Chaos
, vol.16
, pp. 2129-2151
-
-
Alvarez, G.1
Li, S.2
-
2
-
-
33845981416
-
Analysis of security problems in a medical image encryption system
-
3
-
G. Alvarez S. Li L. Hernandez 2007 Analysis of security problems in a medical image encryption system Comput. Biol. Med. 37 3 424 427
-
(2007)
Comput. Biol. Med.
, vol.37
, pp. 424-427
-
-
Alvarez, G.1
Li, S.2
Hernandez, L.3
-
3
-
-
4544340070
-
Cryptography in an algebraic alphabet
-
6
-
L.S. Hill 1929 Cryptography in an algebraic alphabet Am. Math. Month. 36 6 306 312
-
(1929)
Am. Math. Month.
, vol.36
, pp. 306-312
-
-
Hill, L.S.1
-
5
-
-
34548345561
-
-
Department of Mathematics, Zhejiang University Hangzhou, China
-
Li, C., 2005. Cryptanalyses of Some Multimedia Encryption Schemes. MS Thesis, Department of Mathematics, Zhejiang University, Hangzhou, China (in Chinese).
-
(2005)
Cryptanalyses of Some Multimedia Encryption Schemes
-
-
Li, C.1
-
6
-
-
35048844681
-
Cryptanalysis of a chaotic neural network based multimedia encryption scheme
-
C. Li S. Li D. Zhang G. Chen 2004 Cryptanalysis of a chaotic neural network based multimedia encryption scheme LNCS 3333 418 425
-
(2004)
LNCS
, vol.3333
, pp. 418-425
-
-
Li, C.1
Li, S.2
Zhang, D.3
Chen, G.4
-
7
-
-
24344510301
-
Cryptanalysis of a new signal security system for multimedia data transmission
-
8
-
C. Li S. Li G. Chen G. Chen L. Hu 2005 Cryptanalysis of a new signal security system for multimedia data transmission EURASIP J. Appl. Signal Process. 2005 8 1277 1288
-
(2005)
EURASIP J. Appl. Signal Process.
, vol.2005
, pp. 1277-1288
-
-
Li, C.1
Li, S.2
Chen, G.3
Chen, G.4
Hu, L.5
-
8
-
-
24944547508
-
Chosen-plaintext cryptanalysis of a clipped-neural-network-based chaotic cipher
-
C. Li S. Li D. Zhang G. Chen 2005 Chosen-plaintext cryptanalysis of a clipped-neural-network-based chaotic cipher LNCS 3497 630 636
-
(2005)
LNCS
, vol.3497
, pp. 630-636
-
-
Li, C.1
Li, S.2
Zhang, D.3
Chen, G.4
-
9
-
-
32544436119
-
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
-
2
-
C. Li S. Li D.C. Lou 2006 On the security of the Yen-Guo's domino signal encryption algorithm (DSEA) J. Syst. Soft. 79 2 253 258
-
(2006)
J. Syst. Soft.
, vol.79
, pp. 253-258
-
-
Li, C.1
Li, S.2
Lou, D.C.3
-
10
-
-
34548361693
-
Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
-
1-2
-
C. Li S. Li G. Alvarez G. Chen K.T. Lo 2007 Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations Phys. Lett. A 369 1-2 23 30
-
(2007)
Phys. Lett. a
, vol.369
, pp. 23-30
-
-
Li, C.1
Li, S.2
Alvarez, G.3
Chen, G.4
Lo, K.T.5
-
11
-
-
49149120132
-
On the Security Defects of an Image Encryption Scheme
-
Available at Oct. 6, 2007
-
Li, C., Li, S., Asim, M., Nunez, J., Alvarez, G., Chen, G., 2007b. On the Security Defects of an Image Encryption Scheme. Cryptology ePrint Archive: Report 2007/397. Available at http://eprint.iacr.org/2007/397, Oct. 6, 2007.
-
(2007)
Cryptology EPrint Archive: Report 2007/397
-
-
Li, C.1
Li, S.2
Asim, M.3
Nunez, J.4
Alvarez, G.5
Chen, G.6
-
12
-
-
7644238021
-
-
School of Electronic and Information Engineering, Xi'an Jiaotong University Xi'an, China
-
Li, S., 2003. Analyses and New Designs of Digital Chaotic Ciphers. Ph.D Thesis, School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China (in Chinese).
-
(2003)
Analyses and New Designs of Digital Chaotic Ciphers
-
-
Li, S.1
-
13
-
-
85008921093
-
Chaos-based Encryption for Digital Images and Videos
-
Furht, B., Kirovski, D. (Eds.) CRC Press, LLC
-
Li, S., Chen, G., Zheng, X., 2004. Chaos-based Encryption for Digital Images and Videos. In: Furht, B., Kirovski, D. (Eds.), Multimedia Security Handbook. CRC Press, LLC, p.133-167.
-
(2004)
Multimedia Security Handbook
, pp. 133-167
-
-
Li, S.1
Chen, G.2
Zheng, X.3
-
14
-
-
33847647116
-
Cryptanalysis of an image encryption scheme
-
[doi:10.1117/1.2360697]
-
Li, S., Li, C., Lo, K.T., Chen, G., 2006. Cryptanalysis of an image encryption scheme. J. Electr. Imag., 15(4). [doi:10.1117/1.2360697]
-
(2006)
J. Electr. Imag.
, vol.15
, Issue.4
-
-
Li, S.1
Li, C.2
Lo, K.T.3
Chen, G.4
-
16
-
-
44049097510
-
Cryptanalysis of the RCES/RSES image encryption scheme
-
7
-
S. Li C. Li G. Chen X. Mou 2008 Cryptanalysis of the RCES/RSES image encryption scheme J. Syst. Soft. 81 7 1130 1143
-
(2008)
J. Syst. Soft.
, vol.81
, pp. 1130-1143
-
-
Li, S.1
Li, C.2
Chen, G.3
Mou, X.4
-
19
-
-
38949172736
-
Comments on "how to repair the Hill cipher"
-
2
-
Y. Rangel-Romero R. Vega-García A. Menchaca-Méndez D. Acoltzi-Cervantes L. Martínez-Ramos M. Mecate-Zambrano F. Montalvo-Lezama J. Barrón-Vidales N. Cortez-Duarte F. Rodríguez-Henríquez 2008 Comments on "How to repair the Hill cipher" J. Zhejiang Univ. Sci. A 9 2 211 214
-
(2008)
J. Zhejiang Univ. Sci. a
, vol.9
, pp. 211-214
-
-
Rangel-Romero, Y.1
Vega-García, R.2
Menchaca-Méndez, A.3
Acoltzi-Cervantes, D.4
Martínez-Ramos, L.5
Mecate-Zambrano, M.6
Montalvo-Lezama, F.7
Barrón-Vidales, J.8
Cortez-Duarte, N.9
Rodríguez-Henríquez, F.10
-
20
-
-
84890522850
-
Communication theory of secrecy systems
-
4
-
C.E. Shannon 1949 Communication theory of secrecy systems Bell Syst. Tech. J. 28 4 656 715
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
21
-
-
33947609586
-
Security analysis of multimedia encryption schemes based on multiple Huffman table
-
3
-
J. Zhou Z. Liang Y. Chen O.C. Au 2007 Security analysis of multimedia encryption schemes based on multiple Huffman table IEEE Signal Process. Lett. 14 3 201 204
-
(2007)
IEEE Signal Process. Lett.
, vol.14
, pp. 201-204
-
-
Zhou, J.1
Liang, Z.2
Chen, Y.3
Au, O.C.4
|