Pages that link to "Item:Q715909"
From MaRDI portal
The following pages link to Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations (Q715909):
Displaying 18 items.
- Revisiting quantum authentication scheme based on entanglement swapping (Q299512) (← links)
- An improved secure and efficient password and chaos-based two-party key agreement protocol (Q332780) (← links)
- Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem and its improved version (Q432841) (← links)
- Security improvement on an anonymous key agreement protocol based on chaotic maps (Q434848) (← links)
- Quantum deniable authentication protocol (Q479408) (← links)
- Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks (Q551640) (← links)
- Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps (Q718387) (← links)
- An anonymous key agreement protocol based on chaotic maps (Q718505) (← links)
- A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation (Q898479) (← links)
- Cryptanalysis of an image encryption scheme based on the hill cipher (Q946659) (← links)
- Breaking a chaotic image encryption algorithm based on perceptron model (Q1928985) (← links)
- An improved chaotic cryptosystem based on circular bit shift and XOR operations (Q1933221) (← links)
- Secure multiparty quantum secret sharing with the collective eavesdropping-check character (Q1937247) (← links)
- Quantum conference (Q1993783) (← links)
- CONTROLLED HENON SYSTEM AND ITS CRYPTOGRAPHIC APPLICATIONS (Q3065766) (← links)
- BREAKING A CHAOTIC CRYPTOGRAPHIC SCHEME BASED ON COMPOSITION MAPS (Q3065770) (← links)
- Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers (Q3090973) (← links)
- BREAKING AN IMAGE ENCRYPTION ALGORITHM BASED ON CHAOS (Q3165820) (← links)