Cryptosystem using chaotic keys
From MaRDI portal
Publication:1771675
DOI10.1016/J.CHAOS.2004.05.026zbMath1068.94013OpenAlexW2011019052MaRDI QIDQ1771675
Publication date: 18 April 2005
Published in: Chaos, Solitons and Fractals (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.chaos.2004.05.026
Cryptography (94A60) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45)
Related Items (12)
Cryptography based on chaotic random maps with position dependent weighting probabilities ⋮ A novel chaotic block cryptosystem based on iterating map with output-feedback ⋮ An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key ⋮ CHAOTIC CRYPTOGRAPHIC SCHEME BASED ON COMPOSITION MAPS ⋮ A new chaotic cryptosystem ⋮ A novel algorithm for image encryption based on mixture of chaotic maps ⋮ Image encryption with chaotically coupled chaotic maps ⋮ SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS ⋮ Security problems with a chaos-based deniable authentication scheme ⋮ Analysis and improvement for the performance of Baptista's cryptographic scheme ⋮ Self-shrinking chaotic stream ciphers ⋮ FREAC-LUT: A NEW DYNAMIC LOOK-UP TABLE APPROACH TO SECURE CHAOTIC ENCRYPTION
Cites Work
- Cryptography with cycling chaos
- Cryptanalysis of a discrete chaotic cryptosystem using external key
- Communication through chaotic map systems
- A fast chaotic cryptographic scheme with dynamic look-up table
- Cryptanalysis of a chaotic secure communication system
- Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems
- A combined chaotic cryptographic and hashing scheme
- Discrete chaotic cryptography using external key
- A chaotic cryptography scheme for generating short ciphertext
- Cryptanalysis of an ergodic chaotic cipher
- Cryptography with chaos
- Cryptanalysis of a chaotic encryption system
- Analysis of some recently proposed chaos-based encryption algorithms
- A modified chaotic cryptographic method
This page was built for publication: Cryptosystem using chaotic keys