Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations (Q715909): Difference between revisions

From MaRDI portal
Created claim: Wikidata QID (P12): Q121161344, #quickstatements; #temporary_batch_1714634810890
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Cryptanalysis of dynamic look-up table based chaotic cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Use of chaotic dynamical systems in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Synchronization of Chaotic Systems and Transmission of Information / rank
 
Normal rank
Property / cites work
 
Property / cites work: SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS / rank
 
Normal rank
Property / cites work
 
Property / cites work: A novel block cryptosystem based on iterating a chaotic map / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography based on delayed chaotic neural networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography with cycling chaos / rank
 
Normal rank
Property / cites work
 
Property / cites work: Solving ODEs and DDEs with residual control / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4718481 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4869527 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chaotic attractors in delayed neural networks / rank
 
Normal rank

Revision as of 23:09, 3 July 2024

scientific article
Language Label Description Also known as
English
Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
scientific article

    Statements

    Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    19 April 2011
    0 references
    chaos
    0 references
    encryption
    0 references
    delayed chaotic neural network
    0 references
    cryptanalysis
    0 references
    chosen-plaintext attack
    0 references
    known-plaintext attack
    0 references
    differential cryptanalysis
    0 references
    0 references
    0 references

    Identifiers