-
1
-
-
33750542126
-
Some basic cryptographic requirements for chaos-based cryptosystems
-
Álvarez, G. & Li, S. [ 2006] " Some basic cryptographic requirements for chaos-based cryptosystems, " Int. J. Bifurcation and Chaos 16, 2129-2151.
-
(2006)
Int. J. Bifurcation and Chaos
, vol.16
, pp. 2129-2151
-
-
Álvarez, G.1
Li, S.2
-
2
-
-
1342306864
-
A symmetric image encryption scheme based on 3D chaotic cat maps
-
Chen, G., Mao, Y. & Chui, C. K. [2004] "A symmetric image encryption scheme based on 3D chaotic cat maps, " Chaos Solit. Fract. 21, 749-761.
-
(2004)
Chaos Solit. Fract.
, vol.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.K.3
-
3
-
-
79952039477
-
A modified chaos-based joint compression and encryption scheme
-
Chen, J., Zhou, J. & Wong, K.-W. [2011] "A modified chaos-based joint compression and encryption scheme, " IEEE Trans. Circuits Syst.-II 58, 110-114.
-
(2011)
IEEE Trans. Circuits Syst.-II
, vol.58
, pp. 110-114
-
-
Chen, J.1
Zhou, J.2
Wong, K.-W.3
-
4
-
-
84855647718
-
Period distribution of generalized discrete Arnold cat map for N = pe
-
Chen, F., Wong, K.-W., Liao, X. & Xiang, T. [2012] "Period distribution of generalized discrete Arnold cat map for N = pe, " IEEE Trans. Inform. Th. 58, 445-452.
-
(2012)
IEEE Trans. Inform. Th.
, vol.58
, pp. 445-452
-
-
Chen, F.1
Wong, K.-W.2
Liao, X.3
Xiang, T.4
-
7
-
-
10944267248
-
On the security of the Yi-Tan-Siew chaotic cipher
-
Li, S., Chen, G. & Mou, X. [2004] "On the security of the Yi-Tan-Siew chaotic cipher, " IEEE Trans. Circuits Syst.-II: Express Briefs 51, 665-669.
-
(2004)
IEEE Trans. Circuits Syst.-II: Express Briefs
, vol.51
, pp. 665-669
-
-
Li, S.1
Chen, G.2
Mou, X.3
-
8
-
-
24944547508
-
Chosenplaintext cryptanalysis of a clipped-neural-networkbased chaotic cipher
-
Li, C., Li, S., Zhang, D. & Chen, G. [2005a] "Chosenplaintext cryptanalysis of a clipped-neural-networkbased chaotic cipher, " Lecture Notes in Computer Science, Vol. 3497, pp. 630-636.
-
(2005)
Lecture Notes in Computer Science
, vol.3497
, pp. 630-636
-
-
Li, C.1
Li, S.2
Zhang, D.3
Chen, G.4
-
9
-
-
29244491993
-
On the dynamical degradation of digital piecewise linear chaotic maps
-
Li, S., Chen, G. & Mou, X. [2005b] "On the dynamical degradation of digital piecewise linear chaotic maps, " Int. J. Bifurcation and Chaos 15, 3119-3151.
-
(2005)
Int. J. Bifurcation and Chaos
, vol.15
, pp. 3119-3151
-
-
Li, S.1
Chen, G.2
Mou, X.3
-
10
-
-
32544436119
-
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
-
Li, C., Li, S. & Lou, D.-C. [2006] "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA), " J. Syst. Softw. 79, 253-258.
-
(2006)
J. Syst. Softw.
, vol.79
, pp. 253-258
-
-
Li, C.1
Li, S.2
Lou, D.-C.3
-
11
-
-
44049097510
-
Cryptanalysis of the RCES/RSES image encryption scheme
-
Li, S., Li, C., Chen, G. & Lo, K.-T. [2008] "Cryptanalysis of the RCES/RSES image encryption scheme, " J. Syst. Softw. 81, 1130-1143.
-
(2008)
J. Syst. Softw.
, vol.81
, pp. 1130-1143
-
-
Li, S.1
Li, C.2
Chen, G.3
Lo, K.-T.4
-
12
-
-
67349203285
-
On the security defects of an image encryption scheme
-
Li, C., Li, S., Asim, M., Nunez, J., Alvarez, G. & Chen, G. [2009] "On the security defects of an image encryption scheme, " Imag. Vis. Comput. 27, 1371-1381.
-
(2009)
Imag. Vis. Comput.
, vol.27
, pp. 1371-1381
-
-
Li, C.1
Li, S.2
Asim, M.3
Nunez, J.4
Alvarez, G.5
Chen, G.6
-
13
-
-
78549249597
-
Breaking a chaotic cryptographic scheme based on composition maps
-
Li, C., Arroyo, D. & Lo, K.-T. [2010] "Breaking a chaotic cryptographic scheme based on composition maps, " Int. J. Bifurcation and Chaos 20, 2561-2568.
-
(2010)
Int. J. Bifurcation and Chaos
, vol.20
, pp. 2561-2568
-
-
Li, C.1
Arroyo, D.2
Lo, K.-T.3
-
14
-
-
80052162425
-
Breaking an image encryption algorithm based on chaos
-
Li, C., Chen, M. Z. Q. & Lo, K.-T. [2011] "Breaking an image encryption algorithm based on chaos, " Int. J. Bifurcation and Chaos 21, 3518-3524.
-
(2011)
Int. J. Bifurcation and Chaos
, vol.21
, pp. 3518-3524
-
-
Li, C.1
Chen, M.Z.Q.2
Lo, K.-T.3
-
15
-
-
33646847943
-
Near optimal algorithms for solving differential equations of addition with batch queries
-
Paul, S. & Preneel, B. [2005] "Near optimal algorithms for solving differential equations of addition with batch queries, " Lecture Notes in Computer Science, Vol. 3797, pp. 90-103.
-
(2005)
Lecture Notes in Computer Science
, vol.3797
, pp. 90-103
-
-
Paul, S.1
Preneel, B.2
-
16
-
-
47649124075
-
Modified chaotic keybased algorithm for image encryption and its VLSI realization
-
Rao, K. & Gangadhar, C. [2007] "Modified chaotic keybased algorithm for image encryption and its VLSI realization, " Proc. 2007 15th Int. Conf. Digital Signal Processing, pp. 439-442.
-
(2007)
Proc. 2007 15th Int. Conf. Digital Signal Processing
, pp. 439-442
-
-
Rao, K.1
Gangadhar, C.2
-
17
-
-
33847252065
-
Enhanced 1-D chaotic key-based algorithm for image encryption
-
Socek, D., Li, S., Magliveras, S. S. & Furht, B. [2005] "Enhanced 1-D chaotic key-based algorithm for image encryption, " Proc. First IEEE/CreateNet Int. Conf. Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), pp. 406-408.
-
(2005)
Proc. First IEEE/CreateNet Int. Conf. Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005)
, pp. 406-408
-
-
Socek, D.1
Li, S.2
Magliveras, S.S.3
Furht, B.4
-
18
-
-
77954602172
-
Cryptanalysis of Fridrich's chaotic image encryption
-
Solak, E., Cokal, C., Yildiz, O. T. & Biyikoglu, T. [2010a] "Cryptanalysis of Fridrich's chaotic image encryption, " Int. J. Bifurcation and Chaos 20, 1405-1413.
-
(2010)
Int. J. Bifurcation and Chaos
, vol.20
, pp. 1405-1413
-
-
Solak, E.1
Cokal, C.2
Yildiz, O.T.3
Biyikoglu, T.4
-
19
-
-
70449495660
-
Cryptanalysis of a multi-chaotic systems based image cryptosystem
-
Solak, E., Rhouma, R. & Belghith, S. [2010b] "Cryptanalysis of a multi-chaotic systems based image cryptosystem, " Opt. Commun. 283, 232-236.
-
(2010)
Opt. Commun.
, vol.283
, pp. 232-236
-
-
Solak, E.1
Rhouma, R.2
Belghith, S.3
-
20
-
-
4744354733
-
A simple hyperchaos generator based on impulsive switching
-
Takahashi, Y., Nakano, H. & Saito, T. [2004] "A simple hyperchaos generator based on impulsive switching, " IEEE Trans. Circuits Syst.-II: Express Briefs 51, 468-472.
-
(2004)
IEEE Trans. Circuits Syst.-II: Express Briefs
, vol.51
, pp. 468-472
-
-
Takahashi, Y.1
Nakano, H.2
Saito, T.3
-
21
-
-
24944575304
-
Cryptanalysis of the hash functions MD4 and RIPEMD
-
Wang, X., Lai, X., Feng, D., Chen, H. & Yu, X. [2005] "Cryptanalysis of the hash functions MD4 and RIPEMD, " Lecture Notes in Computer Science, Vol. 3494, pp. 1-18.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
22
-
-
34047165325
-
Improving the security of a dynamic look-up table based chaotic cryptosystem
-
Xiao, D., Liao, X. & Wong, K.-W. [2006] "Improving the security of a dynamic look-up table based chaotic cryptosystem, " IEEE Trans. Circuits Syst.-II: Express Briefs 53, 502-506.
-
(2006)
IEEE Trans. Circuits Syst.-II: Express Briefs
, vol.53
, pp. 502-506
-
-
Xiao, D.1
Liao, X.2
Wong, K.-W.3
-
24
-
-
79952006983
-
On the security of chaotic convolutional coder
-
Zhou, J. & Au, O. C. [2011] "On the security of chaotic convolutional coder, " IEEE Trans. Circuits Syst.-I 58, 595-606.
-
(2011)
IEEE Trans. Circuits Syst.-I
, vol.58
, pp. 595-606
-
-
Zhou, J.1
Au, O.C.2
|