-
1
-
-
33750542126
-
Some basic cryptographic requirements for chaos-based cryptosystems
-
10.1142/S0218127406015970
-
Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(8), 2129-2151.
-
(2006)
International Journal of Bifurcation and Chaos
, vol.16
, Issue.8
, pp. 2129-2151
-
-
Alvarez, G.1
Li, S.2
-
2
-
-
1342306864
-
A symmetric image encryption based on 3D chaotic maps
-
10.1016/j.chaos.2003.12.022
-
Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption based on 3D chaotic maps. Chaos, Solitons and Fractals, 21, 749-761.
-
(2004)
Chaos, Solitons and Fractals
, vol.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.K.3
-
3
-
-
67650545607
-
-
U.S. Patent 4,074,066
-
Ehrsam, W. F., Meyer, C. H. W., Smith, J. L., & Tuchman, W. L. (1976). Message verification and transmission error detection by block chaining. U.S. Patent 4,074,066.
-
(1976)
Message Verification and Transmission Error Detection by Block Chaining
-
-
Ehrsam, W.F.1
Meyer, C.H.W.2
Smith, J.L.3
Tuchman, W.L.4
-
4
-
-
0032089417
-
Symmetric ciphers based on two-dimensional chaotic maps
-
10.1142/S021812749800098X
-
Fridirich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259-1284.
-
(1998)
International Journal of Bifurcation and Chaos
, vol.8
, Issue.6
, pp. 1259-1284
-
-
Fridirich, J.1
-
5
-
-
37549014203
-
A new image encryption algorithm based on hyper-chaos
-
10.1016/j.physleta.2007.07.040
-
Gao, T., & Chen, Z. (2008). A new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(4), 394-400.
-
(2008)
Physics Letters A
, vol.372
, Issue.4
, pp. 394-400
-
-
Gao, T.1
Chen, Z.2
-
6
-
-
75149144296
-
Improvement of Rhouma's attacks on gao algorithm
-
10.1016/j.physleta.2010.01.024
-
Ge, X., Liu, F., Lu, B., & Yang, C. (2010). Improvement of Rhouma's attacks on gao algorithm. Physics Letters A, 374(11-12), 1362-1367.
-
(2010)
Physics Letters A
, vol.374
, Issue.11-12
, pp. 1362-1367
-
-
Ge, X.1
Liu, F.2
Lu, B.3
Yang, C.4
-
7
-
-
24944459842
-
Chaos-based image encryption algorithm
-
10.1016/j.physleta.2005.08.006
-
Guan, Z. H., Huang, F., & Guan, W. (2005). Chaos-based image encryption algorithm. Physics Letters A, 346(1-3), 153-157.
-
(2005)
Physics Letters A
, vol.346
, Issue.1-3
, pp. 153-157
-
-
Guan, Z.H.1
Huang, F.2
Guan, W.3
-
8
-
-
29244491993
-
On the dynamical degradation of digital piecewise linear chaotic maps
-
10.1142/S0218127405014052
-
Li, S., Chen, G., & Mou, X. (2005). On the dynamical degradation of digital piecewise linear chaotic maps. International Journal of Bifurcation and Chaos, 15(10), 3119-3151.
-
(2005)
International Journal of Bifurcation and Chaos
, vol.15
, Issue.10
, pp. 3119-3151
-
-
Li, S.1
Chen, G.2
Mou, X.3
-
9
-
-
34548590193
-
A novel algorithm for image encryption based on mixture of chaotic maps
-
10.1016/j.chaos.2006.05.011
-
Mahmodi, H., Behnia, S., Akhshani, A., & Akhavan, A. (2008). A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons and Fractals, 35, 408-419.
-
(2008)
Chaos, Solitons and Fractals
, vol.35
, pp. 408-419
-
-
Mahmodi, H.1
Behnia, S.2
Akhshani, A.3
Akhavan, A.4
-
11
-
-
0036404061
-
Chaotic encryption scheme for real time digital video
-
San Jose, CA, USA
-
Mou, X., Li, S., Zheng, X., & Cai, Y. (2002). Chaotic encryption scheme for real time digital video. In SPIE on electronic imaging, San Jose, CA, USA.
-
(2002)
SPIE on Electronic Imaging
-
-
Mou, X.1
Li, S.2
Zheng, X.3
Cai, Y.4
-
12
-
-
50049112396
-
Cryptanalysis of a new image encryption algorithm based on hyper-chaos
-
10.1016/j.physleta.2008.07.057
-
Rhouma, R., & Belghith, S. (2008). Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(38), 5973-5978.
-
(2008)
Physics Letters A
, vol.372
, Issue.38
, pp. 5973-5978
-
-
Rhouma, R.1
Belghith, S.2
-
13
-
-
84890522850
-
Communication theory of secrecy systems
-
Shanon, C. E. (1949). Communication theory of secrecy systems. The Bell System Technical Journal, 28(4), 656-715.
-
(1949)
The Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shanon, C.E.1
-
15
-
-
0036740496
-
Image encryption scheme based on truncated Baker transformation
-
Yano, K., & Tanaka, K. (2002). Image encryption scheme based on truncated Baker transformation. IIEICE Transactions on Fundamentals E85-A(9), 2025-2035.
-
(2002)
IIEICE Transactions on Fundamentals
, vol.85
, Issue.9
, pp. 2025-2035
-
-
Yano, K.1
Tanaka, K.2
-
16
-
-
0036697706
-
New voice over internet protocol technique with hierarchical data security protection
-
Yen, J. C., Guo, J., & Pan, H. F. (2002). New voice over internet protocol technique with hierarchical data security protection. IEE Vis Image Signal Process 149, 4.
-
(2002)
IEE Vis Image Signal Process
, vol.149
, pp. 4
-
-
Yen, J.C.1
Guo, J.2
Pan, H.F.3
|