BREAKING A CHAOTIC CRYPTOGRAPHIC SCHEME BASED ON COMPOSITION MAPS (Q3065770): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Cryptanalysis of dynamic look-up table based chaotic cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking an encryption scheme based on chaotic baker map / rank
 
Normal rank
Property / cites work
 
Property / cites work: SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS / rank
 
Normal rank
Property / cites work
 
Property / cites work: CHAOTIC CRYPTOGRAPHIC SCHEME BASED ON COMPOSITION MAPS / rank
 
Normal rank
Property / cites work
 
Property / cites work: A symmetric image encryption scheme based on 3D chaotic cat maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4419475 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Symmetric Ciphers Based on Two-Dimensional Chaotic Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: PROBLEMS WITH A PROBABILISTIC ENCRYPTION SCHEME BASED ON CHAOTIC SYSTEMS / rank
 
Normal rank
Property / cites work
 
Property / cites work: RETURN-MAP CRYPTANALYSIS REVISITED / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations / rank
 
Normal rank
Property / cites work
 
Property / cites work: CRYPTANALYSIS OF OBSERVER BASED DISCRETE-TIME CHAOTIC ENCRYPTION SCHEMES / rank
 
Normal rank

Revision as of 15:29, 3 July 2024

scientific article
Language Label Description Also known as
English
BREAKING A CHAOTIC CRYPTOGRAPHIC SCHEME BASED ON COMPOSITION MAPS
scientific article

    Statements

    BREAKING A CHAOTIC CRYPTOGRAPHIC SCHEME BASED ON COMPOSITION MAPS (English)
    0 references
    0 references
    0 references
    0 references
    6 January 2011
    0 references
    0 references
    chaos
    0 references
    image
    0 references
    encryption
    0 references
    cryptanalysis
    0 references
    differential attack
    0 references