On the cryptanalysis of two cryptographic algorithms that utilize chaotic neural networks
From MaRDI portal
Publication:1665747
DOI10.1155/2015/468567zbMATH Open1395.94308OpenAlexW2032058157WikidataQ59118658 ScholiaQ59118658MaRDI QIDQ1665747FDOQ1665747
Authors: Ke Qin, B. John Oommen
Publication date: 27 August 2018
Published in: Mathematical Problems in Engineering (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1155/2015/468567
Recommendations
- Advances in Neural Networks – ISNN 2005
- Cryptanalysis of multiple chaotic systems based public key encryption technique
- On the security analysis of a Hopfield chaotic neural network-based image encryption algorithm
- Cryptanalysis of a cryptographic scheme based on delayed chaotic neural networks
- Analysis of some recently proposed chaos-based encryption algorithms
Cites Work
- Title not available (Why is that?)
- Mathematical Systems Theory I
- Chaotic attractors in delayed neural networks
- Cryptography with chaos
- Chaos-based random number generators-part I: analysis [cryptography]
- Keyed hash function based on a chaotic map
- A novel image encryption algorithm based on a 3D chaotic map
- Cryptography based on delayed chaotic neural networks
- Cryptanalysis of a chaotic encryption system
- On the design of chaos-based secure communication systems
- Chaos and randomness
- Title not available (Why is that?)
Cited In (3)
This page was built for publication: On the cryptanalysis of two cryptographic algorithms that utilize chaotic neural networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1665747)