An improved chaotic cryptosystem based on circular bit shift and XOR operations
From MaRDI portal
Recommendations
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map
- An improved block cryptosystem based on iterating chaotic map
- Cryptanalysis and improvement on a cryptosystem based on a chaotic map
- A novel block cryptosystem based on iterating a chaotic map
Cites work
- scientific article; zbMATH DE number 854547 (Why is no real title available?)
- A novel block cryptosystem based on iterating a chaotic map
- A symmetric image encryption scheme based on 3D chaotic cat maps
- An improved block cryptosystem based on iterating chaotic map
- Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- Cryptography based on delayed chaotic neural networks
- Extended substitution-diffusion based image cipher using chaotic standard map
- Image encryption using chaotic coupled map lattices with time-varying delays
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
- YET ANOTHER CHAOTIC ATTRACTOR
Cited in
(9)- Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos
- Chaotic image encryption algorithm based on circulant operation
- Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- A novel stream encryption scheme with avalanche effect
- Chaotic map-embedded Blowfish algorithm for security enhancement of colour image encryption
- An improved secure and efficient password and chaos-based two-party key agreement protocol
- A cryptosystem for lossless/lossy grayscale images in IWT domain using chaotic map-based generated key matrices
- A framework to enhance security of physically unclonable functions using chaotic circuits
This page was built for publication: An improved chaotic cryptosystem based on circular bit shift and XOR operations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1933221)