-
1
-
-
33845255587
-
A new image encryption algorithm based on onedimensional polynomial chaotic maps
-
Akhavan, A., Mahmodi, H. & Akhshani, A. [2006] "A new image encryption algorithm based on onedimensional polynomial chaotic maps", Lecture Notes in Computer Science 4263, 963-971.
-
(2006)
Lecture Notes in Computer Science
, vol.4263
, pp. 963-971
-
-
Akhavan, A.1
Mahmodi, H.2
Akhshani, A.3
-
2
-
-
52149098630
-
A novel block cipher based on hierarchy of onedimensional composition chaotic maps
-
Akhshani, A., Mahmodi, H. & Akhavan, A. [2006] "A novel block cipher based on hierarchy of onedimensional composition chaotic maps", IEEE Int. Conf. Image Processing, pp. 1993-1996.
-
(2006)
IEEE Int. Conf. Image Processing
, pp. 1993-1996
-
-
Akhshani, A.1
Mahmodi, H.2
Akhavan, A.3
-
3
-
-
2442662577
-
Cryptanalysis of dynamic look-up table based chaotic cryptosystems
-
Álvarez, G., Montoya, F., Romera, M. & Pastor, G. [2004] "Cryptanalysis of dynamic look-up table based chaotic cryptosystems", Phys. Lett. A 326, 211-218.
-
(2004)
Phys. Lett. A
, vol.326
, pp. 211-218
-
-
Álvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
4
-
-
33344455991
-
Breaking an encryption scheme based on chaotic baker map
-
Álvarez, G. & Li, S. [2005] "Breaking an encryption scheme based on chaotic baker map", Phys. Lett. A 352, 78-82.
-
(2005)
Phys. Lett. A
, vol.352
, pp. 78-82
-
-
Álvarez, G.1
Li, S.2
-
5
-
-
33750542126
-
Some basic cryptographic requirements for chaos-based cryptosystems
-
Álvarez, G. & Li, S. [2006] "Some basic cryptographic requirements for chaos-based cryptosystems", Int. J. Bifurcation and Chaos 16, 2129-2151.
-
(2006)
Int. J. Bifurcation and Chaos
, vol.16
, pp. 2129-2151
-
-
Álvarez, G.1
Li, S.2
-
6
-
-
54749118164
-
On the security of a new image encryption scheme based on chaotic map lattices
-
article 033112
-
Arroyo, D., Rhouma, R., Álvarez, G., Li, S. & Fernandez, V. [2008] "On the security of a new image encryption scheme based on chaotic map lattices", Chaos 18, article 033112.
-
(2008)
Chaos
, vol.18
-
-
Arroyo, D.1
Rhouma, R.2
Álvarez, G.3
Li, S.4
Fernandez, V.5
-
7
-
-
43949115190
-
Chaotic cryptographic scheme based on composition maps
-
Behnia, S., Akhshania, A., Akhavanb, A. & Mahmodi, H. [2008] "Chaotic cryptographic scheme based on composition maps", Int. J. Bifurcation and Chaos 18, 251-261.
-
(2008)
Int. J. Bifurcation and Chaos
, vol.18
, pp. 251-261
-
-
Behnia, S.1
Akhshania, A.2
Akhavanb, A.3
Mahmodi, H.4
-
8
-
-
1342306864
-
A symmetric image encryption scheme based on 3d chaotic cat maps
-
Chen, G., Mao, Y. & Chui, C. K. [2004] "A symmetric image encryption scheme based on 3d chaotic cat maps", Chaos Solit. Fract. 21, 749-761.
-
(2004)
Chaos Solit. Fract.
, vol.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.K.3
-
11
-
-
0032089417
-
Symmetric ciphers based on twodimensional chaotic maps
-
Fridrich, J. [1998] "Symmetric ciphers based on twodimensional chaotic maps", Int. J. Bifurcation and Chaos 8, 1259-1284.
-
(1998)
Int. J. Bifurcation and Chaos
, vol.8
, pp. 1259-1284
-
-
Fridrich, J.1
-
12
-
-
0012584447
-
Problems with a probabilistic encryption scheme based on chaotic systems
-
Li, S., Mou, X., Yang, B. L., Ji, Z. & Zhang, J. [2003] "Problems with a probabilistic encryption scheme based on chaotic systems", Int. J. Bifurcation and Chaos 13, 3063-3077.
-
(2003)
Int. J. Bifurcation and Chaos
, vol.13
, pp. 3063-3077
-
-
Li, S.1
Mou, X.2
Yang, B.L.3
Ji, Z.4
Zhang, J.5
-
13
-
-
10944267248
-
On the security of the yi-tan-siew chaotic cipher
-
Li, S., Chen, G. & Mou, X. [2004] "On the security of the yi-tan-siew chaotic cipher", IEEE Trans. Circuits Syst.-II 51, 665-669.
-
(2004)
IEEE Trans. Circuits Syst.-II
, vol.51
, pp. 665-669
-
-
Li, S.1
Chen, G.2
Mou, X.3
-
14
-
-
17744365628
-
Breaking a chaos-noise-based secure communication scheme
-
article 013703
-
Li, S., Álvarez, G., Chen, G. & Mou, X. [2005] "Breaking a chaos-noise-based secure communication scheme, Chaos 15, article 013703.
-
(2005)
Chaos
, vol.15
-
-
Li, S.1
Álvarez, G.2
Chen, G.3
Mou, X.4
-
15
-
-
32544436119
-
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
-
Li, C., Li, S. & Lou, D.-C. [2006a] "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)", J. Syst. Softw. 79, 253-258.
-
(2006)
J. Syst. Softw
, vol.79
, pp. 253-258
-
-
Li, C.1
Li, S.2
Lou, D.-C.3
-
16
-
-
33645526435
-
Cryptanalysis of a data security protection scheme for VoIP
-
Li, C., Li, S., Zhang, D. & Chen, G. [2006b] "Cryptanalysis of a data security protection scheme for VoIP", IEE Proc.-Vis. Imag. Sign. Process. 153, 1-10.
-
(2006)
IEE Proc.-Vis. Imag. Sign. Process
, vol.153
, pp. 1-10
-
-
Li, C.1
Li, S.2
Zhang, D.3
Chen, G.4
-
17
-
-
33747501804
-
Returnmap cryptanalysis revisited
-
Li, S., Chen, G. & Alvarez, G. [2006c] "Returnmap cryptanalysis revisited", Int. J. Bifurcation and Chaos 16, 1557-1568.
-
(2006)
Int. J. Bifurcation and Chaos
, vol.16
, pp. 1557-1568
-
-
Li, S.1
Chen, G.2
Alvarez, G.3
-
18
-
-
34548361693
-
Cryptanalysis of two chaotic encryption schemes based on circular bit shift and xor operations
-
Li, C., Li, S., Alvarez, G., Chen, G. & Lo, K.-T. [2007] "Cryptanalysis of two chaotic encryption schemes based on circular bit shift and xor operations", Phys. Lett. A 369, 23-30.
-
(2007)
Phys. Lett. A
, vol.369
, pp. 23-30
-
-
Li, C.1
Li, S.2
Alvarez, G.3
Chen, G.4
Lo, K.-T.5
-
19
-
-
42049108003
-
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
-
Li, S., Li, C., Chen, G., Bourbakis, N. G. & Lo, K.-T. [2008a] "A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks", Sign. Process.: Imag. Commun. 23, 212-223.
-
(2008)
Sign. Process.: Imag. Commun.
, vol.23
, pp. 212-223
-
-
Li, S.1
Li, C.2
Chen, G.3
Bourbakis, N.G.4
Lo, K.-T.5
-
20
-
-
44049097510
-
Cryptanalysis of the RCES/RSES image encryption scheme
-
Li, S., Li, C., Chen, G. & Lo, K.-T. [2008b] "Cryptanalysis of the RCES/RSES image encryption scheme", J. Syst. Softw. 81, 1130-1143.
-
(2008)
J. Syst. Softw
, vol.81
, pp. 1130-1143
-
-
Li, S.1
Li, C.2
Chen, G.3
Lo, K.-T.4
-
21
-
-
67349203285
-
On the security defects of an image encryption scheme
-
Li, C., Li, S., Asim, M., Nunez, J., Álvarez, G. & Chen, G. [2009] "On the security defects of an image encryption scheme", Imag. Vis. Comput. 27, 1371-1381.
-
(2009)
Imag. Vis. Comput.
, vol.27
, pp. 1371-1381
-
-
Li, C.1
Li, S.2
Asim, M.3
Nunez, J.4
Álvarez, G.5
Chen, G.6
-
22
-
-
16344371432
-
Security analysis of a chaos-based image encryption algorithm
-
Lian, S., Sun, J. & Wang, Z. [2005] "Security analysis of a chaos-based image encryption algorithm", Physica A: Statis. Mech. Appl. 351, 645-661.
-
(2005)
Physica A: Statis. Mech. Appl.
, vol.351
, pp. 645-661
-
-
Lian, S.1
Sun, J.2
Wang, Z.3
-
23
-
-
1542316660
-
Image and video encryption using scan patterns
-
Maniccam, S. S. & Bourbakis, N. G. [2004] "Image and video encryption using scan patterns", Patt. Recogn. 37, 725-737.
-
(2004)
Patt. Recogn
, vol.37
, pp. 725-737
-
-
Maniccam, S.S.1
Bourbakis, N.G.2
-
24
-
-
33747058774
-
Image encryption using chaotic logistic map
-
Pareek, N., Patidar, V. & Sud, K. [2006] "Image encryption using chaotic logistic map", Imag. Vis. Comput. 24, 926-934.
-
(2006)
Imag. Vis. Comput.
, vol.24
, pp. 926-934
-
-
Pareek, N.1
Patidar, V.2
Sud, K.3
-
26
-
-
0000378191
-
Fast encryption of image data using chaotic Kolmogorov flows
-
Scharinger, J. [1998] "Fast encryption of image data using chaotic Kolmogorov flows", J. Electron. Imag. 7, 318-325.
-
(1998)
J. Electron. Imag.
, vol.7
, pp. 318-325
-
-
Scharinger, J.1
-
27
-
-
18644385641
-
Cryptanalysis of observer based discrete-time chaotic encryption schemes
-
Solak, E. [2005] "Cryptanalysis of observer based discrete-time chaotic encryption schemes", Int. J. Bifurcation and Chaos 15, 653-658.
-
(2005)
Int. J. Bifurcation and Chaos
, vol.15
, pp. 653-658
-
-
Solak, E.1
-
28
-
-
57949091424
-
Embedding compression in chaos-based cryptography
-
Wong, K.-W. & Yuen, C.-H. [2008] "Embedding compression in chaos-based cryptography", IEEE Trans. Circuits Syst.-II 55, 1193-1197.
-
(2008)
IEEE Trans. Circuits Syst.-II
, vol.55
, pp. 1193-1197
-
-
Wong, K.-W.1
Yuen, C.-H.2
-
29
-
-
34047165325
-
Improving the security of a dynamic look-up table based chaotic cryptosystem
-
Xiao, D., Liao, X. & Wong, K.-W. [2006] "Improving the security of a dynamic look-up table based chaotic cryptosystem", IEEE Trans. Circuits Syst.-II 53, 502-506.
-
(2006)
IEEE Trans. Circuits Syst.-II
, vol.53
, pp. 502-506
-
-
Xiao, D.1
Liao, X.2
Wong, K.-W.3
|