Breaking a chaos-based secure communication scheme designed by an improved modulation method (Q2483654): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claims
ReferenceBot (talk | contribs)
Changed an Item
 
(5 intermediate revisions by 5 users not shown)
Property / author
 
Property / author: Gonzalo Alvarez / rank
 
Normal rank
Property / author
 
Property / author: Guan-Rong Chen / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2089338971 / rank
 
Normal rank
Property / arXiv ID
 
Property / arXiv ID: nlin/0411007 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improving the security of chaotic encryption by using a simple modulating method / rank
 
Normal rank
Property / cites work
 
Property / cites work: A zero-crossing approach to uncover the mask by chaotic encryption with periodic modulation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analyzing and improving a chaotic encryption method / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalyzing an improved security modulated chaotic encryption scheme using ciphertext absolute value / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of dynamic look-up table based chaotic cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Synchronization in chaotic systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: EXPERIMENTAL DEMONSTRATION OF SECURE COMMUNICATIONS VIA CHAOTIC SYNCHRONIZATION / rank
 
Normal rank
Property / cites work
 
Property / cites work: TRANSMISSION OF DIGITAL SIGNALS BY CHAOTIC SYNCHRONIZATION / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4355492 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Extracting information masked by chaos and contaminated with noise: some considerations on the security of communication approaches using chaos. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking parameter modulated chaotic secure communication system / rank
 
Normal rank
Property / cites work
 
Property / cites work: Recovery of digital signals from chaotic switching / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signal Extraction from Chaotic Communications / rank
 
Normal rank
Property / cites work
 
Property / cites work: A SIMPLE METHOD TO REVEAL THE PARAMETERS OF THE LORENZ SYSTEM / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decoding Digital Information from the Cascaded Heterogeneous Chaotic Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decoding chaotic cryptography without access to the superkey. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Heterogeneous chaotic systems based cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography based on chaotic systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Impulsive Control and Synchronization of Nonlinear Dynamical Systems and Application to Secure Communication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reconstructing the keystream from a chaotic encryption scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2753184 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4869527 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 13:31, 10 June 2024

scientific article
Language Label Description Also known as
English
Breaking a chaos-based secure communication scheme designed by an improved modulation method
scientific article

    Statements

    Breaking a chaos-based secure communication scheme designed by an improved modulation method (English)
    0 references
    0 references
    0 references
    0 references
    25 July 2005
    0 references
    0 references
    return-map
    0 references
    Bu-Wang method
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references