-
1
-
-
84893107930
-
A secret key cryptosystem by iterating a chaotic map
-
Springer-Verlag, Berlin, Advances in cryptology: proceedings of EUROCRYPT 91
-
Habutsu T., Nishio Y., Sasase I., Mori S. A secret key cryptosystem by iterating a chaotic map. LNCS 1991, vol. 547:127-140. Springer-Verlag, Berlin.
-
(1991)
LNCS
, vol.547
, pp. 127-140
-
-
Habutsu, T.1
Nishio, Y.2
Sasase, I.3
Mori, S.4
-
2
-
-
0030660985
-
Discrete chaotic cryptography
-
Kotulski Z., Szczepanski J. Discrete chaotic cryptography. Annal der Phys 1997, 509(5):381-394.
-
(1997)
Annal der Phys
, vol.509
, Issue.5
, pp. 381-394
-
-
Kotulski, Z.1
Szczepanski, J.2
-
3
-
-
85196220170
-
-
Chaotic cryptosystems. In: Proceedings of IEEE International Carnahan Conference on Security Technology
-
Alvarez G, Monotoya F, Pastor G, Romera M. Chaotic cryptosystems. In: Proceedings of IEEE International Carnahan Conference on Security Technology, 1999. p. 332-338.
-
(1999)
, pp. 332-338
-
-
Alvarez, G.1
Monotoya, F.2
Pastor, G.3
Romera, M.4
-
4
-
-
0042786512
-
Cryptography with chaos
-
Baptista M.S. Cryptography with chaos. Phys Lett A 1998, 240:50-54.
-
(1998)
Phys Lett A
, vol.240
, pp. 50-54
-
-
Baptista, M.S.1
-
6
-
-
84974731225
-
Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography
-
Springer-Verlag, Berlin, Proceedings of INDOCRYPT 01
-
Li S., Mou X., Cai Y. Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography. Lecture notes in computer science 2001, vol. 2247:316-329. Springer-Verlag, Berlin.
-
(2001)
Lecture notes in computer science
, vol.2247
, pp. 316-329
-
-
Li, S.1
Mou, X.2
Cai, Y.3
-
7
-
-
85196148791
-
-
Analyses and new designs of digital chaotic ciphers, Ph.D. thesis, School of Electronics and Information Engineering, Xian Jiaotong University, Xian, China, available online at
-
Li S, Analyses and new designs of digital chaotic ciphers, Ph.D. thesis, School of Electronics and Information Engineering, Xian Jiaotong University, Xian, China, available online at, 2003. http://www.hooklee.com/pub.html.
-
(2003)
-
-
Li, S.1
-
8
-
-
1342306864
-
A symmetric image encryption scheme based on 3D chaotic cat maps
-
Chen G., Mao Y., Chui C. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Soliton Fract 2004, 21:749-761.
-
(2004)
Chaos Soliton Fract
, vol.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.3
-
9
-
-
24944459842
-
Chaos-based image encryption algorithm
-
Guan Z., Huang F., Guan W. Chaos-based image encryption algorithm. Phys Lett A 2005, 346:153-157.
-
(2005)
Phys Lett A
, vol.346
, pp. 153-157
-
-
Guan, Z.1
Huang, F.2
Guan, W.3
-
10
-
-
69249152191
-
Irregularly decimated chaotic map(s) for binary digits generations
-
Kanso A., Smaoui N. Irregularly decimated chaotic map(s) for binary digits generations. Int J Bifurcat Chaos 2009, 19(4):1169-1183.
-
(2009)
Int J Bifurcat Chaos
, vol.19
, Issue.4
, pp. 1169-1183
-
-
Kanso, A.1
Smaoui, N.2
-
11
-
-
67349197413
-
Logistic chaotic maps for binary numbers generations
-
Kanso A., Smaoui N. Logistic chaotic maps for binary numbers generations. Chaos Soliton Fract 2009, 40(5):2557-2568.
-
(2009)
Chaos Soliton Fract
, vol.40
, Issue.5
, pp. 2557-2568
-
-
Kanso, A.1
Smaoui, N.2
-
12
-
-
77956058186
-
Self-shrinking chaotic stream ciphers
-
Kanso A. Self-shrinking chaotic stream ciphers. Commun Nonlinear Sci Numer Simul 2011, 16(2):822-836.
-
(2011)
Commun Nonlinear Sci Numer Simul
, vol.16
, Issue.2
, pp. 822-836
-
-
Kanso, A.1
-
13
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon C. Communication theory of secrecy systems. Bell Syst Tech J 1949, 28(4):656-715.
-
(1949)
Bell Syst Tech J
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.1
-
14
-
-
84944878354
-
-
CRC Press, Boca. Raton, FL
-
Menezes A., Van Oorschot P., Vanstone S. Handbook of applied cryptography 1997, CRC Press, Boca. Raton, FL.
-
(1997)
Handbook of applied cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
15
-
-
85000391603
-
Cryptanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT 91
-
Springer-Verlag, Berlin, Advances in cryptology: proceedings of EUROCRYPT 91
-
Biham E. Cryptanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT 91. LNCS 1991, vol. 547:532-534. Springer-Verlag, Berlin.
-
(1991)
LNCS
, vol.547
, pp. 532-534
-
-
Biham, E.1
-
16
-
-
78649555580
-
On improved image encryption scheme based on chaotic map lattices
-
Jastrzebski K., Kotulski Z. On improved image encryption scheme based on chaotic map lattices. Eng Trans 2009, 57(2):69-84.
-
(2009)
Eng Trans
, vol.57
, Issue.2
, pp. 69-84
-
-
Jastrzebski, K.1
Kotulski, Z.2
-
17
-
-
0032045063
-
Large encryption binary images with higher security
-
Chung K.L., Chang L.C. Large encryption binary images with higher security. Pattern Recognit Lett 1998, 19(56):461-468.
-
(1998)
Pattern Recognit Lett
, vol.19
, Issue.56
, pp. 461-468
-
-
Chung, K.L.1
Chang, L.C.2
-
18
-
-
0032089417
-
Symmetric ciphers based on two-dimensional chaotic maps
-
Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat Chaos 1998, 8(6):1259-1284.
-
(1998)
Int. J. Bifurcat Chaos
, vol.8
, Issue.6
, pp. 1259-1284
-
-
Fridrich, J.1
-
19
-
-
0000378191
-
Fast encryption of image data using chaotic Kolmogorov flows
-
Scharinger J. Fast encryption of image data using chaotic Kolmogorov flows. J Electron Imag 1998, 7(2):318-325.
-
(1998)
J Electron Imag
, vol.7
, Issue.2
, pp. 318-325
-
-
Scharinger, J.1
-
20
-
-
0035451781
-
A new encryption algorithm for image cryptosystems
-
Chang C.C., Hwang M.S., Chen T.S. A new encryption algorithm for image cryptosystems. J Syst Softw 2001, 58(2):83-91.
-
(2001)
J Syst Softw
, vol.58
, Issue.2
, pp. 83-91
-
-
Chang, C.C.1
Hwang, M.S.2
Chen, T.S.3
-
21
-
-
0036740496
-
Image encryption scheme based on a truncated Baker transformation
-
Yano K., Tanaka K. Image encryption scheme based on a truncated Baker transformation. IEICE Trans Fundament 2002, E85-A(9):2025-2035.
-
(2002)
IEICE Trans Fundament
, vol.E85A
, Issue.9
, pp. 2025-2035
-
-
Yano, K.1
Tanaka, K.2
-
22
-
-
33745692974
-
Design of a new cryptography system
-
Springer-Verlag, Berlin
-
Chen H.C., Yen J.C., Guo J.I. Design of a new cryptography system. Proceedings PCM series LNCS 2002, vol. 2532:1041-1048. Springer-Verlag, Berlin.
-
(2002)
Proceedings PCM series LNCS
, vol.2532
, pp. 1041-1048
-
-
Chen, H.C.1
Yen, J.C.2
Guo, J.I.3
-
23
-
-
34247205141
-
Chaos based image encryption
-
Springer-Verlag, New York, E. Bayro Corrochano (Ed.) Handbook of computational geometry for pattern recognition
-
Mao Y., Chen G. Chaos based image encryption. Computer vision, neural computing and robotics 2003, Springer-Verlag, New York. E. Bayro Corrochano (Ed.).
-
(2003)
Computer vision, neural computing and robotics
-
-
Mao, Y.1
Chen, G.2
-
24
-
-
0242574287
-
A new cryptography system and its VLSI realization
-
Chen H.C., Yen J.C. A new cryptography system and its VLSI realization. J Syst Architect 2003, 49:355-367.
-
(2003)
J Syst Architect
, vol.49
, pp. 355-367
-
-
Chen, H.C.1
Yen, J.C.2
-
25
-
-
1542316660
-
Image and video encryption using SCAN patterns
-
Maniccam S.S., Bourbakis N.G. Image and video encryption using SCAN patterns. Pattern Recognit 2004, 37(4):725-737.
-
(2004)
Pattern Recognit
, vol.37
, Issue.4
, pp. 725-737
-
-
Maniccam, S.S.1
Bourbakis, N.G.2
-
26
-
-
85008921093
-
Chaos-based encryption for digital images and videos
-
CRC Press, Boca Raton, B. Furht, D. Kirovski (Eds.)
-
Li S., Chen G., Zheng X. Chaos-based encryption for digital images and videos. Multimedia security handbook 2004, 133-167. CRC Press, Boca Raton. B. Furht, D. Kirovski (Eds.).
-
(2004)
Multimedia security handbook
, pp. 133-167
-
-
Li, S.1
Chen, G.2
Zheng, X.3
-
27
-
-
10444257964
-
A novel fast image encryption scheme based on 3D chaotic Baker maps
-
Mao Y., Chen G., Lian S. A novel fast image encryption scheme based on 3D chaotic Baker maps. Int J Bifurcat Chaos 2004, 14(10):3613-3624.
-
(2004)
Int J Bifurcat Chaos
, vol.14
, Issue.10
, pp. 3613-3624
-
-
Mao, Y.1
Chen, G.2
Lian, S.3
-
28
-
-
26844567623
-
Design of integrated multimedia compression and encryption systems
-
Wu C.P., Kuo C.C.J. Design of integrated multimedia compression and encryption systems. IEEE Trans Multimedia 2005, 7(5):828-839.
-
(2005)
IEEE Trans Multimedia
, vol.7
, Issue.5
, pp. 828-839
-
-
Wu, C.P.1
Kuo, C.C.J.2
-
29
-
-
33745610486
-
A joint signal processing and cryptographic approach to multimedia encryption
-
Mao Y., Wu M. A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans Image Process 2006, 15(7):2061-2075.
-
(2006)
IEEE Trans Image Process
, vol.15
, Issue.7
, pp. 2061-2075
-
-
Mao, Y.1
Wu, M.2
-
30
-
-
33749379998
-
Encryption and decryption of images with chaotic map lattices
-
art. no. 033118
-
Flores-Carmona N.J., Carpio-Valadez M. Encryption and decryption of images with chaotic map lattices. Chaos 2006, 16(3). art. no. 033118.
-
(2006)
Chaos
, vol.16
, Issue.3
-
-
Flores-Carmona, N.J.1
Carpio-Valadez, M.2
-
31
-
-
31444446656
-
A new chaotic algorithm for image encryption
-
Gao H., Zhang Y., Liang S., Li D. A new chaotic algorithm for image encryption. Chaos Soliton Fract 2006, 29(2):393-409.
-
(2006)
Chaos Soliton Fract
, vol.29
, Issue.2
, pp. 393-409
-
-
Gao, H.1
Zhang, Y.2
Liang, S.3
Li, D.4
-
32
-
-
37549014203
-
A new image encryption algorithm based on hyper-chaos
-
Gao T., Gu Q., Chen Z. A new image encryption algorithm based on hyper-chaos. Phys Lett A 2008, 374(4):394-400.
-
(2008)
Phys Lett A
, vol.374
, Issue.4
, pp. 394-400
-
-
Gao, T.1
Gu, Q.2
Chen, Z.3
-
33
-
-
43949115190
-
Chaotic cryptographic scheme based on composition maps
-
Behnia S., Akhshani A., Mahmodi H., Akhavan A. Chaotic cryptographic scheme based on composition maps. Int J Bifurcat Chaos 2008, 18(1):251-261.
-
(2008)
Int J Bifurcat Chaos
, vol.18
, Issue.1
, pp. 251-261
-
-
Behnia, S.1
Akhshani, A.2
Mahmodi, H.3
Akhavan, A.4
-
34
-
-
60049083969
-
A new substitution-diffusion based image cipher using chaotic standard and logistic maps
-
Patidar V., Pareek N., Sud K. A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 2009, 14(7):3056-3075.
-
(2009)
Commun Nonlinear Sci Numer Simul
, vol.14
, Issue.7
, pp. 3056-3075
-
-
Patidar, V.1
Pareek, N.2
Sud, K.3
-
35
-
-
67349286030
-
Efficient image or video encryption based on spatiotemporal chaos system
-
Lian S. Efficient image or video encryption based on spatiotemporal chaos system. Chaos Soliton Fract 2009, 40(5):2509-2519.
-
(2009)
Chaos Soliton Fract
, vol.40
, Issue.5
, pp. 2509-2519
-
-
Lian, S.1
-
37
-
-
0036885204
-
Cryptanalysis of an encryption scheme for binary images
-
Chang C.C., Yu T.X. Cryptanalysis of an encryption scheme for binary images. Pattern Recognit Lett 2002, 23(14):1847-1852.
-
(2002)
Pattern Recognit Lett
, vol.23
, Issue.14
, pp. 1847-1852
-
-
Chang, C.C.1
Yu, T.X.2
-
38
-
-
0036453480
-
-
On the security of an image encryption method. In: Proceedings IEEE International Conference on Image Processing (ICIP2002)
-
Li S, Zheng X. On the security of an image encryption method. In: Proceedings IEEE International Conference on Image Processing (ICIP2002), vol. 2, 2002. p. 925-928.
-
(2002)
, vol.2
, pp. 925-928
-
-
Li, S.1
Zheng, X.2
-
39
-
-
0036296858
-
-
Cryptanalysis of a chaotic image encryption method. In: Proceedings IEEE International Symposium on Circuits and Systems (ISCAS2002)
-
Li S, Zheng X. Cryptanalysis of a chaotic image encryption method. In: Proceedings IEEE International Symposium on Circuits and Systems (ISCAS2002), vol. II, 2002. p. 708-711.
-
(2002)
, vol.2
, pp. 708-711
-
-
Li, S.1
Zheng, X.2
-
40
-
-
28844475533
-
Cryptanalysis of the two-dimensional circulation encryption algorithm
-
Canniere C.D., Lano J., Preneel B. Cryptanalysis of the two-dimensional circulation encryption algorithm. EURASIP J Appl Signal Process 2005, 2005(12):1923-1927.
-
(2005)
EURASIP J Appl Signal Process
, vol.2005
, Issue.12
, pp. 1923-1927
-
-
Canniere, C.D.1
Lano, J.2
Preneel, B.3
-
41
-
-
24344510301
-
Cryptanalysis of a new signal security system for multimedia data transmission
-
Li C., Li S., Chen G., Chen G., Hu L. Cryptanalysis of a new signal security system for multimedia data transmission. EURASIP J Appl Signal Process 2005, 2005(8):1277-1288.
-
(2005)
EURASIP J Appl Signal Process
, vol.2005
, Issue.8
, pp. 1277-1288
-
-
Li, C.1
Li, S.2
Chen, G.3
Chen, G.4
Hu, L.5
-
42
-
-
23144450151
-
On the security of 3D cat map based symmetric image encryption scheme
-
Wang K., Pei W., Zou L., Song A., He Z. On the security of 3D cat map based symmetric image encryption scheme. Phys Lett A 2005, 343(6):432-439.
-
(2005)
Phys Lett A
, vol.343
, Issue.6
, pp. 432-439
-
-
Wang, K.1
Pei, W.2
Zou, L.3
Song, A.4
He, Z.5
-
43
-
-
32544436119
-
On the security of the Yen-Guos domino signal encryption algorithm (DSEA)
-
Li C., Li S., Lou D.C., Zhang D. On the security of the Yen-Guos domino signal encryption algorithm (DSEA). J Syst Softw 2006, 79(2):253-258.
-
(2006)
J Syst Softw
, vol.79
, Issue.2
, pp. 253-258
-
-
Li, C.1
Li, S.2
Lou, D.C.3
Zhang, D.4
-
44
-
-
51749085313
-
-
On the security of a class of image encryption schemes. In: Proceedings of 2008 IEEE International Symposium on Circuits and Systems
-
Li C, Chen G. On the security of a class of image encryption schemes. In: Proceedings of 2008 IEEE International Symposium on Circuits and Systems, 2008. p. 3290-3293.
-
(2008)
, pp. 3290-3293
-
-
Li, C.1
Chen, G.2
-
45
-
-
44049097510
-
Cryptanalysis of the RCES/RSES image encryption scheme
-
Li S., Li C., Chen G., Lo K.-T. Cryptanalysis of the RCES/RSES image encryption scheme. J Syst Softw 2008, 81(7):1130-1143.
-
(2008)
J Syst Softw
, vol.81
, Issue.7
, pp. 1130-1143
-
-
Li, S.1
Li, C.2
Chen, G.3
Lo, K.-T.4
-
46
-
-
54749118164
-
On the security of a new image encryption scheme based on chaotic map lattices
-
art. no. 033112
-
Arroyo D., Rhouma R., Alvarez G., Li S., Fernandez V. On the security of a new image encryption scheme based on chaotic map lattices. Chaos 2008, 18(3). art. no. 033112.
-
(2008)
Chaos
, vol.18
, Issue.3
-
-
Arroyo, D.1
Rhouma, R.2
Alvarez, G.3
Li, S.4
Fernandez, V.5
-
47
-
-
67349148877
-
Cryptanalysis of an image encryption scheme based on a compound chaotic sequence
-
Li C., Li S., Chen G., Halang W.A. Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis Comput 2009, 27(8):1035-1039.
-
(2009)
Image Vis Comput
, vol.27
, Issue.8
, pp. 1035-1039
-
-
Li, C.1
Li, S.2
Chen, G.3
Halang, W.A.4
-
48
-
-
49149115619
-
Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem
-
Rhouma R., Belghith S. Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem. Phys Lett A 2008, 372(36):5790-5794.
-
(2008)
Phys Lett A
, vol.372
, Issue.36
, pp. 5790-5794
-
-
Rhouma, R.1
Belghith, S.2
-
49
-
-
50049112396
-
Cryptanalysis of a new image encryption algorithm based on hyper-chaos
-
Rhouma R., Belghith S. Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 2008, 372(38):5973-5978.
-
(2008)
Phys Lett A
, vol.372
, Issue.38
, pp. 5973-5978
-
-
Rhouma, R.1
Belghith, S.2
-
50
-
-
51749085313
-
-
On the security of a class of image encryption schemes. In: IEEE International Symposium on Circuits and Systems
-
Li C, Chen G, On the security of a class of image encryption schemes. In: IEEE International Symposium on Circuits and Systems, 2008. p. 3290-3293.
-
(2008)
, pp. 3290-3293
-
-
Li, C.1
Chen, G.2
-
51
-
-
67349148537
-
Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption
-
Alvarez G., Li S. Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun Nonlinear Sci Numer Simul 2009, 14(11):3743-3749.
-
(2009)
Commun Nonlinear Sci Numer Simul
, vol.14
, Issue.11
, pp. 3743-3749
-
-
Alvarez, G.1
Li, S.2
-
52
-
-
74449090309
-
Cryptanalysis of a new substitution-diffusion based image cipher
-
Rhouma R., Solak E., Belghith S. Cryptanalysis of a new substitution-diffusion based image cipher. Commun Nonlinear Sci Numer Simul 2010, 15(7):1887-1892.
-
(2010)
Commun Nonlinear Sci Numer Simul
, vol.15
, Issue.7
, pp. 1887-1892
-
-
Rhouma, R.1
Solak, E.2
Belghith, S.3
-
53
-
-
77954602172
-
Cryptanalysis of Fridrich's chaotic image encryption
-
Solak E., Çokal C., Yildiz O.T., Biyikoǧlu T. Cryptanalysis of Fridrich's chaotic image encryption. Int J Bifurcat Chaos 2010, 20(5):1405-1413.
-
(2010)
Int J Bifurcat Chaos
, vol.20
, Issue.5
, pp. 1405-1413
-
-
Solak, E.1
Çokal, C.2
Yildiz, O.T.3
Biyikoǧlu, T.4
-
54
-
-
78549249597
-
Breaking a chaotic cryptographic scheme based on composition maps
-
Li C., Arroyo D., Lo K. Breaking a chaotic cryptographic scheme based on composition maps. Int J Bifurcat Chaos 2010, 20(8):2561-2568.
-
(2010)
Int J Bifurcat Chaos
, vol.20
, Issue.8
, pp. 2561-2568
-
-
Li, C.1
Arroyo, D.2
Lo, K.3
-
56
-
-
85196139591
-
-
NIST Special Publication 800-22 rev1, A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications, online document
-
NIST Special Publication 800-22 rev1, A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications, 2008, online document, http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html.
-
(2008)
-
-
-
57
-
-
85196191558
-
-
DIEHARD: A battery of tests of Randomness
-
Marsaglia G. DIEHARD: A battery of tests of Randomness, 1996. http://www.stat.fsu.edu/pub/diehard/.
-
(1996)
-
-
Marsaglia, G.1
-
58
-
-
85196172732
-
-
Andreas Trepte,
-
Andreas Trepte, http://commons.wikimedia.org/wiki/File:Elisabeth-Kirche-Marburg.jpg.
-
-
-
-
60
-
-
0001177156
-
On the relationship between complexity and entropy for markov chains and regular languages
-
Li W. On the relationship between complexity and entropy for markov chains and regular languages. Complex Syst 1991, 5(4):381-399.
-
(1991)
Complex Syst
, vol.5
, Issue.4
, pp. 381-399
-
-
Li, W.1
-
61
-
-
45849121786
-
Parallel image encryption algorithm based on discretized chaotic map
-
Zhou Q., Wong K.W., Liao X., Xiang T., Hu Y. Parallel image encryption algorithm based on discretized chaotic map. Chaos Soliton Fract 2008, 38:1081-1092.
-
(2008)
Chaos Soliton Fract
, vol.38
, pp. 1081-1092
-
-
Zhou, Q.1
Wong, K.W.2
Liao, X.3
Xiang, T.4
Hu, Y.5
-
62
-
-
77950264854
-
Image encryption based on strange attractor
-
Giesl J., Vlcek K. Image encryption based on strange attractor. ICGST-GVIP J. II 2009, 19-26.
-
(2009)
ICGST-GVIP J. II
, pp. 19-26
-
-
Giesl, J.1
Vlcek, K.2
|