-
1
-
-
4243121393
-
Advances in cryptology: Proceedings of CRYPTO
-
Adams, C., Tavares, S.: In: Advances in Cryptology: Proceedings of CRYPTO. Lect. Notes. Comput., vol. 89, pp. 612-615 (1989)
-
(1989)
Lect. Notes. Comput.
, vol.89
, pp. 612-615
-
-
Adams, C.1
Tavares, S.2
-
2
-
-
0345303927
-
Cryptanalysis of a discrete chaotic cryptosystem using external key
-
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys. Lett. A 319, 334-339 (2000)
-
(2000)
Phys. Lett. A
, vol.319
, pp. 334-339
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
3
-
-
0037421353
-
Cryptanalysis of a chaotic secure communication system
-
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a chaotic secure communication system. Phys. Lett. A 306, 200-205 (2003)
-
(2003)
Phys. Lett. A
, vol.306
, pp. 200-205
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
4
-
-
0345303927
-
Cryptanalysis of a discrete chaotic cryptosystem using external key
-
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys. Lett. A 319, 334-339 (2003)
-
(2003)
Phys. Lett. A
, vol.319
, pp. 334-339
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
5
-
-
2442662577
-
Cryptanalysis of dynamic look-up table based chaotic cryptosystems
-
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys. Lett. A 326, 211-218 (2004)
-
(2004)
Phys. Lett. A
, vol.326
, pp. 211-218
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
6
-
-
68749105566
-
Comments on "modified Baptista type chaotic cryptosystem via matrix secret key"
-
[Phys. Lett. A 372 (2008) 5427]
-
Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Comments on "Modified Baptista type chaotic cryptosystem via matrix secret key" [Phys. Lett. A 372 (2008) 5427]. Phys. Lett. A 373, 3398-3400 (2009)
-
(2009)
Phys. Lett. A
, vol.373
, pp. 3398-3400
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
7
-
-
0042786512
-
Cryptography with chaos
-
Baptista, M.S.: Cryptography with chaos. Phys. Lett. A 240, 50-54 (1998)
-
(1998)
Phys. Lett. A
, vol.240
, pp. 50-54
-
-
Baptista, M.S.1
-
8
-
-
0026397734
-
Differential cryptanalysis of DESlike cryptosystems
-
Biham, E., Shamir, A.: Differential cryptanalysis of DESlike cryptosystems. J. Cryptol. 4(1), 3-72 (1991)
-
(1991)
J. Cryptol.
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
9
-
-
33747348397
-
An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
-
Chen, G., Chen, Y., Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos Solitons Fractals 31, 571-577 (2007)
-
(2007)
Chaos Solitons Fractals
, vol.31
, pp. 571-577
-
-
Chen, G.1
Chen, Y.2
Liao, X.3
-
10
-
-
85020558749
-
Advances in cryptology: Proceedings of EURO-CRYPT
-
Dawson, M., Tavares, S.: In: Advances in Cryptology: Proceedings of EURO-CRYPT. Lect. Notes. Comput., vol. 91, pp. 352-367 (1991)
-
(1991)
Lect. Notes. Comput.
, vol.91
, pp. 352-367
-
-
Dawson, M.1
Tavares, S.2
-
11
-
-
35148829532
-
Advances in cryptology: Proceedings of CRYPTO
-
Detombe, J., Tavares, S.: In: Advances in Cryptology: Proceedings of CRYPTO. Lecture Notes in Comput. Sci., vol. 92, pp. 165-181 (1992)
-
(1992)
Lecture Notes in Comput. Sci.
, vol.92
, pp. 165-181
-
-
Detombe, J.1
Tavares, S.2
-
12
-
-
4243129231
-
A novel method for designing S-boxes based on chaotic maps
-
Guoping, T., Xiaofeng, L., Yong, C.: A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fractals 23, 413-419 (2005)
-
(2005)
Chaos Solitons Fractals
, vol.23
, pp. 413-419
-
-
Guoping, T.1
Xiaofeng, L.2
Yong, C.3
-
13
-
-
84863989374
-
Nonlinear dynamics, cryptanalysis and improvement of an extended chaotic mapsbased key agreement protocol
-
doi:10.1007/s11071-012-0335-0
-
He, D., Chen, Y., Chen, J.: Nonlinear dynamics, cryptanalysis and improvement of an extended chaotic mapsbased key agreement protocol. Nonlinear Dyn. (2012). doi:10.1007/s11071-012-0335-0
-
(2012)
Nonlinear Dyn.
-
-
He, D.1
Chen, Y.2
Chen, J.3
-
14
-
-
80052654803
-
A new algorithm to construct secure keys for AES
-
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: A new algorithm to construct secure keys for AES. Int. J. Contemp. Math. Sci. 5(26), 1263-1270 (2010)
-
(2010)
Int. J. Contemp. Math. Sci.
, vol.5
, Issue.26
, pp. 1263-1270
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Mahmood, H.4
-
15
-
-
80054812135
-
Comparative analysis of S-boxes based on graphical SAC
-
Hussain, I., Shah, T., Mahmood, H., Afzal, M.: Comparative analysis of S-boxes based on graphical SAC. Int. J. Comput. Appl. 2(5), 975-8887 (2010)
-
(2010)
Int. J. Comput. Appl.
, vol.2
, Issue.5
, pp. 975-8887
-
-
Hussain, I.1
Shah, T.2
Mahmood, H.3
Afzal, M.4
-
16
-
-
84864917746
-
Construction of new S-box using a linear fractional transformation
-
Hussain, I., Shah, T., Gondal, M.A., Khan,W.A.: Construction of new S-box using a linear fractional transformation. World Appl. Sci. J. 14(12), 1779-1785 (2011)
-
(2011)
World Appl. Sci. J.
, vol.14
, Issue.12
, pp. 1779-1785
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Khan, W.A.4
-
17
-
-
80053462731
-
Some analysis of S-box based on residue of prime number
-
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Some analysis of S-box based on residue of prime number. Proc. Pak. Acad. Sci. 48(2), 111-115 (2011)
-
(2011)
Proc. Pak. Acad. Sci.
, vol.48
, Issue.2
, pp. 111-115
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Mahmood, H.4
-
18
-
-
84864936221
-
Analyses of SKIPJACK S-box
-
Hussain, I., Shah, T., Gondal, M.A., Wang, Y.: Analyses of SKIPJACK S-box. World Appl. Sci. J. 13(11), 2385-2388 (2011)
-
(2011)
World Appl. Sci. J.
, vol.13
, Issue.11
, pp. 2385-2388
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Wang, Y.4
-
19
-
-
84867580749
-
An efficient image encryption algorithm based on S8 S-box transformation and NCA map
-
doi:10.1016/j.optcom.2012.06.011
-
Hussain, I., Shah, T., Gondal, M.A.: An efficient image encryption algorithm based on S8 S-box transformation and NCA map. Opt. Commun. (2012). doi:10.1016/j.optcom.2012.06.011
-
(2012)
Opt. Commun.
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
-
20
-
-
84876438336
-
A projective general linear group based algorithm for the construction of substitution box for block ciphers
-
doi:10.1007/s00521-012-0870-0
-
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-0870-0
-
(2012)
Neural Comput. Appl.
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Mahmood, H.4
-
21
-
-
84867728541
-
Analysis of S-box in image encryption using root mean square error method
-
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Analysis of S-box in image encryption using root mean square error method. Z. Naturforsch. A 67a, 327-332 (2012)
-
(2012)
Z. Naturforsch. A
, vol.67 A
, pp. 327-332
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Mahmood, H.4
-
22
-
-
84865803149
-
Generalized majority logic criterion to analyze the statistical strength of S-boxes
-
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z. Naturforsch. A 67a, 282-288 (2012)
-
(2012)
Z. Naturforsch. A
, vol.67 A
, pp. 282-288
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Mahmood, H.4
-
23
-
-
84866731670
-
Construction of S8 Lui J S-boxes and their application
-
doi:10.1016/j.camwa.2012.05.017
-
Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Construction of S8 Lui J S-boxes and their application. Comput. Math. Appl. (2012). doi:10.1016/j.camwa.2012.05.017
-
(2012)
Comput. Math. Appl.
-
-
Hussain, I.1
Shah, T.2
Gondal, M.A.3
Mahmood, H.4
-
24
-
-
84876438336
-
A projective general linear group based algorithm for the construction of substitution box for block ciphers
-
doi:10.1007/s00521-012-0870-0
-
Hussain, I., Shah, T., Mahmood, H., Gondal, M.A.: A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-0870-0
-
(2012)
Neural Comput. Appl.
-
-
Hussain, I.1
Shah, T.2
Mahmood, H.3
Gondal, M.A.4
-
25
-
-
84879838956
-
A group theoretic approach to construct cryptographically strong substitution boxes
-
doi:10.1007/s00521-012-0914-5
-
Hussain, I., Shah, T., Mahmood, H., Gondal, M.A.: A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-0914-5
-
(2012)
Neural Comput. Appl.
-
-
Hussain, I.1
Shah, T.2
Mahmood, H.3
Gondal, M.A.4
-
26
-
-
84865783598
-
S8 affine power affine S-boxes and their application
-
doi:10.1007/s00521-012-1036-9
-
Hussain, I., Shah, T., Mahmood, H., Gondal, M.A.: S8 affine power affine S-boxes and their application. Neural Comput. Appl. (2012). doi:10.1007/s00521- 012-1036-9
-
(2012)
Neural Comput. Appl.
-
-
Hussain, I.1
Shah, T.2
Mahmood, H.3
Gondal, M.A.4
-
27
-
-
61449202019
-
Nonlinear dynamics and chaos methods in neuro-dynamics and complex data analysis
-
Ivancevic, T., Jain, L., Pattison, J., Hariz, A.: Nonlinear dynamics and chaos methods in neuro-dynamics and complex data analysis. Nonlinear Dyn. 56, 23-44 (2009)
-
(2009)
Nonlinear Dyn.
, vol.56
, pp. 23-44
-
-
Ivancevic, T.1
Jain, L.2
Pattison, J.3
Hariz, A.4
-
28
-
-
0035250017
-
Chaos and cryptography: Block encryption ciphers based on chaotic maps
-
Jakimoski, G., Kocarev, L.: Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. 48(2), 163 (2001)
-
(2001)
IEEE Trans. Circuits Syst.
, vol.48
, Issue.2
, pp. 163
-
-
Jakimoski, G.1
Kocarev, L.2
-
29
-
-
84861748201
-
An extended chaotic maps-based key agreement protocol with user anonymity
-
doi:10.1007/s11071-011-0247-0254
-
Lee, C.-C., Chen, C.-L., Wu, C.-Y., Huang, S.-Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. (2011). doi:10.1007/s11071-011-0247-4
-
(2011)
Nonlinear Dyn.
-
-
Lee, C.-C.1
Chen, C.-L.2
Wu, C.-Y.3
Huang, S.-Y.4
-
30
-
-
18244420943
-
Improving security of a chaotic encryption approach
-
Li, S., Mou, X., Ji, Z., Zhang, J., Cai, Y.: Improving security of a chaotic encryption approach. Phys. Lett. A 290, 127-160 (2001)
-
(2001)
Phys. Lett. A
, vol.290
, pp. 127-160
-
-
Li, S.1
Mou, X.2
Ji, Z.3
Zhang, J.4
Cai, Y.5
-
31
-
-
0032685466
-
A perturbation method for nonlinear twodimensional maps
-
Maccari, A.: A perturbation method for nonlinear twodimensional maps. Nonlinear Dyn. 19, 295-312 (1999)
-
(1999)
Nonlinear Dyn.
, vol.19
, pp. 295-312
-
-
Maccari, A.1
-
32
-
-
77955550959
-
A method for designing strong Sboxes based on chaotic Lorenz system
-
Özkaynak, F., Özer, A.B.: A method for designing strong Sboxes based on chaotic Lorenz system. Phys. Lett. A 374, 3733-3738 (2010)
-
(2010)
Phys. Lett. A
, vol.374
, pp. 3733-3738
-
-
Özkaynak, F.1
Özer, A.B.2
-
33
-
-
0024106741
-
Towards effective nonlinear cryptosystem design
-
Pieprzyk, J., Finkelsten, G.: Towards effective nonlinear cryptosystem design. IEE Proc. E 135, 325-335 (1988)
-
(1988)
IEe Proc. e
, vol.135
, pp. 325-335
-
-
Pieprzyk, J.1
Finkelsten, G.2
-
34
-
-
84864934556
-
Construction of cryptographically strong 8 × 8 S-boxes
-
Shah, T., Hussain, I., Gondal, M.A., Khan,W.A.: Construction of cryptographically strong 8 × 8 S-boxes.World Appl. Sci. J. 13(11), 2389-2395 (2011)
-
(2011)
World Appl. Sci. J.
, vol.13
, Issue.11
, pp. 2389-2395
-
-
Shah, T.1
Hussain, I.2
Gondal, M.A.3
Khan, W.A.4
-
35
-
-
80052669713
-
Statistical analysis of S-box in image encryption applications based on majority logic criterion
-
Shah, T., Hussain, I., Gondal, M.A., Mahmood, H.: Statistical analysis of S-box in image encryption applications based on majority logic criterion. Int. J. Phys. Sci. 6(16), 4110-4127 (2011)
-
(2011)
Int. J. Phys. Sci.
, vol.6
, Issue.16
, pp. 4110-4127
-
-
Shah, T.1
Hussain, I.2
Gondal, M.A.3
Mahmood, H.4
-
36
-
-
84867898403
-
Image encryption algorithm based on PGL(2,GF(2 ∧ 8)) S-boxes and TD-ERCS chaotic sequence
-
doi:10.1007/s11071-012-0440-0
-
Shah, T., Hussain, I., Gondal, M.A.: Image encryption algorithm based on PGL(2,GF(2 ∧ 8)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dyn. (2012). doi:10.1007/s11071-012-0440-0
-
(2012)
Nonlinear Dyn.
-
-
Shah, T.1
Hussain, I.2
Gondal, M.A.3
-
37
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(656), 715 (1949)
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.656
, pp. 715
-
-
Shannon, C.E.1
-
38
-
-
78650800464
-
Chaos synchronization of discrete-time dynamic systems with a limited capacity communication channel
-
Wang, G.: Chaos synchronization of discrete-time dynamic systems with a limited capacity communication channel. Nonlinear Dyn. 63, 277-283 (2011)
-
(2011)
Nonlinear Dyn
, vol.63
, pp. 277-283
-
-
Wang, G.1
-
39
-
-
59949096428
-
A block cipher with dynamic S-boxes based on tent map
-
Wang, Y., Wong, K.W., Liao, X., Xiang, T.: A block cipher with dynamic S-boxes based on tent map. Commun. Nonlinear Sci. Numer. Simul. 14, 3089-3099 (2009)
-
(2009)
Commun. Nonlinear Sci. Numer. Simul.
, vol.14
, pp. 3089-3099
-
-
Wang, Y.1
Wong, K.W.2
Liao, X.3
Xiang, T.4
-
40
-
-
84862832224
-
A novel method to design S-box based on chaotic map and genetic algorithm
-
Wang, Y., Wong, K.W., Li, C., Li, Y.: A novel method to design S-box based on chaotic map and genetic algorithm. Phys. Lett. A 376, 827-833 (2012)
-
(2012)
Phys. Lett. A
, vol.376
, pp. 827-833
-
-
Wang, Y.1
Wong, K.W.2
Li, C.3
Li, Y.4
-
41
-
-
85020573990
-
Advances in cryptology: Proceedings of CRYPTO
-
Webster, A.F., Tavares, S.: In: Advances in Cryptology: Proceedings of CRYPTO. Lect. Notes. Comput. Sci., vol. 85, pp. 523-534 (1986)
-
(1986)
Lect. Notes. Comput. Sci.
, vol.85
, pp. 523-534
-
-
Webster, A.F.1
Tavares, S.2
|