메뉴 건너뛰기




Volumn 14, Issue 7, 2009, Pages 3089-3099

A block cipher with dynamic S-boxes based on tent map

Author keywords

Block cipher; Chaos based cryptosystem; S boxes; Tent map

Indexed keywords

FUNCTIONS; LYAPUNOV METHODS; SECURITY OF DATA;

EID: 59949096428     PISSN: 10075704     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cnsns.2008.12.005     Document Type: Article
Times cited : (147)

References (22)
  • 1
    • 85196221156 scopus 로고    scopus 로고
    • Habutsu T, Nishio Y. A secret key cryptosystem by iterating a chaotic map. In: Advances in cryptology-EuroCrypt_91. Lecture notes in computer science 0547, Spinger, Berlin; 1991. p. 127-40.
    • Habutsu T, Nishio Y. A secret key cryptosystem by iterating a chaotic map. In: Advances in cryptology-EuroCrypt_91. Lecture notes in computer science 0547, Spinger, Berlin; 1991. p. 127-40.
  • 2
    • 0036123125 scopus 로고    scopus 로고
    • Cryptosystems with discretized chaotic maps
    • Masuda N., and Aihara N. Cryptosystems with discretized chaotic maps. IEEE Trans Circ Syst-I 49 1 (2002) 28-40
    • (2002) IEEE Trans Circ Syst-I , vol.49 , Issue.1 , pp. 28-40
    • Masuda, N.1    Aihara, N.2
  • 3
    • 37249092682 scopus 로고    scopus 로고
    • One-way hash function construction based on 2D coupled map lattices
    • Wang Y., Liao X., Xiao D., and Wong K.W. One-way hash function construction based on 2D coupled map lattices. Inform Sci 178 (2008) 1391-1406
    • (2008) Inform Sci , Issue.178 , pp. 1391-1406
    • Wang, Y.1    Liao, X.2    Xiao, D.3    Wong, K.W.4
  • 4
    • 34547285788 scopus 로고    scopus 로고
    • Selective image encryption using a spatiotemporal chaotic system
    • Xiang T., Wong K.W., and Liao X. Selective image encryption using a spatiotemporal chaotic system. Chaos 17 (2007) 0231151-02311512
    • (2007) Chaos , Issue.17 , pp. 0231151-02311512
    • Xiang, T.1    Wong, K.W.2    Liao, X.3
  • 5
    • 36048937251 scopus 로고    scopus 로고
    • Optical image encryption using fractional fourier transform and chaos
    • Singh N., and Sinha A. Optical image encryption using fractional fourier transform and chaos. Opt Laser Eng 46 (2008) 117-123
    • (2008) Opt Laser Eng , Issue.46 , pp. 117-123
    • Singh, N.1    Sinha, A.2
  • 6
    • 40849137988 scopus 로고    scopus 로고
    • A fast image encryption scheme based on chaotic standard map
    • Wong K.W., Kwok B.S., and Law W.S. A fast image encryption scheme based on chaotic standard map. Phys Lett A 372 (2008) 2645-2652
    • (2008) Phys Lett A , Issue.372 , pp. 2645-2652
    • Wong, K.W.1    Kwok, B.S.2    Law, W.S.3
  • 7
    • 35248850363 scopus 로고    scopus 로고
    • Encryption and decryption of information in chaotic communication systems governed by delay-differential equations
    • Prokhorov M.D., and Ponomarenko V.I. Encryption and decryption of information in chaotic communication systems governed by delay-differential equations. Chaos Solitons Fract 35 (2008) 871-877
    • (2008) Chaos Solitons Fract , Issue.35 , pp. 871-877
    • Prokhorov, M.D.1    Ponomarenko, V.I.2
  • 8
    • 33747058774 scopus 로고    scopus 로고
    • Image encryption using chaotic logistic map
    • Pareek N.K., Patidar V., and Sud K.K. Image encryption using chaotic logistic map. Image Vision Comput 24 (2006) 926-934
    • (2006) Image Vision Comput , Issue.24 , pp. 926-934
    • Pareek, N.K.1    Patidar, V.2    Sud, K.K.3
  • 9
    • 34250692682 scopus 로고    scopus 로고
    • Confidential communication through chaos encryption in wireless sensor network
    • Chen S., and Zhong X. Confidential communication through chaos encryption in wireless sensor network. J China Univ Mining Technol 17 (2007) 258-261
    • (2007) J China Univ Mining Technol , Issue.17 , pp. 258-261
    • Chen, S.1    Zhong, X.2
  • 10
    • 4243129231 scopus 로고    scopus 로고
    • A novel method for designing S-boxes based on chaotic maps
    • Tang G., Liao X., and Chen Y. A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fract 23 (2005) 413-419
    • (2005) Chaos Solitons Fract , vol.23 , pp. 413-419
    • Tang, G.1    Liao, X.2    Chen, Y.3
  • 11
    • 1342317751 scopus 로고    scopus 로고
    • Chaos and cryptography: block encryption ciphers
    • Jakimoski G., and Kocarev L. Chaos and cryptography: block encryption ciphers. IEEE Trans Circuits Syst-I 48 2 (2001) 163-170
    • (2001) IEEE Trans Circuits Syst-I , vol.48 , Issue.2 , pp. 163-170
    • Jakimoski, G.1    Kocarev, L.2
  • 12
    • 33747348397 scopus 로고    scopus 로고
    • An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
    • Chen G., Chen Y., and Liao X. An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos Solitons Fract 31 3 (2007) 571-579
    • (2007) Chaos Solitons Fract , vol.31 , Issue.3 , pp. 571-579
    • Chen, G.1    Chen, Y.2    Liao, X.3
  • 13
    • 9544225075 scopus 로고    scopus 로고
    • A method for designing dynamical S-boxes based on discretized chaotic map
    • Tang G., and Liao X. A method for designing dynamical S-boxes based on discretized chaotic map. Chaos Solitons Fract 23 5 (2005) 1901-1909
    • (2005) Chaos Solitons Fract , vol.23 , Issue.5 , pp. 1901-1909
    • Tang, G.1    Liao, X.2
  • 15
    • 0003589319 scopus 로고
    • IEEE standard for binary floating-point arithmetic
    • IEEE Computer Society, August
    • IEEE Computer Society, IEEE standard for binary floating-point arithmetic, ANSI/IEEE Std. 754-1985; August 1985.
    • (1985) ANSI/IEEE Std , vol.754
  • 16
    • 85032878553 scopus 로고
    • Good S-boxes are easy to find
    • Advances in cryptology: proceedings of the CRYPTO_89
    • Adamas C, Tavares S. Good S-boxes are easy to find. In: Advances in cryptology: proceedings of the CRYPTO_89. Lecture notes in computer science; 1989. p. 612-15.
    • (1989) Lecture notes in computer science , pp. 612-615
    • Adamas, C.1    Tavares, S.2
  • 19
    • 0026397734 scopus 로고
    • Differential cryptanalysis of DES-like cryptosystems
    • Biham E., and Shamir A. Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4 1 (1991) 3-72
    • (1991) J Cryptol , vol.4 , Issue.1 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 20
    • 84890522850 scopus 로고
    • Communication theory of secrecy system
    • Shannon C.E. Communication theory of secrecy system. Bell Syst Tech J 28 (1949) 656-715
    • (1949) Bell Syst Tech J , Issue.28 , pp. 656-715
    • Shannon, C.E.1
  • 21
    • 33846348219 scopus 로고    scopus 로고
    • Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
    • Zhang J., Wang X., and Zhang W. Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter. Phys Lett A 362 (2007) 439-448
    • (2007) Phys Lett A , vol.362 , pp. 439-448
    • Zhang, J.1    Wang, X.2    Zhang, W.3
  • 22
    • 0026122066 scopus 로고
    • What every computer scientist should know about floating-point arithmetic?
    • Goldberg D., and Priest D. What every computer scientist should know about floating-point arithmetic?. ACM Comput Survey 23 1 (1991) 5-48
    • (1991) ACM Comput Survey , vol.23 , Issue.1 , pp. 5-48
    • Goldberg, D.1    Priest, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.