Decoding chaotic cryptography without access to the superkey.
From MaRDI portal
Publication:1419343
DOI10.1016/S0960-0779(02)00377-6zbMath1035.94010OpenAlexW2031490406MaRDI QIDQ1419343
Savita Angadi, Prabhakar G. Vaidya
Publication date: 14 January 2004
Published in: Chaos, Solitons and Fractals (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/s0960-0779(02)00377-6
Cryptography (94A60) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45)
Related Items (11)
An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key ⋮ RETURN-MAP CRYPTANALYSIS REVISITED ⋮ Estimating system parameters of Chua's circuit from synchronizing signal ⋮ FPGA implementation of a coupled-map-lattice-based cryptosystem ⋮ A stream cipher based on a spatiotemporal chaotic system ⋮ SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS ⋮ Breaking a chaos-based secure communication scheme designed by an improved modulation method ⋮ Chaotic analysis of traffic time series ⋮ Analyzing and improving a chaotic encryption method ⋮ A nonlinear generalization of singular value decomposition and its applications to mathematical modeling and chaotic cryptanalysis ⋮ Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers
Cites Work
This page was built for publication: Decoding chaotic cryptography without access to the superkey.