An improved chaotic cryptosystem based on circular bit shift and XOR operations
DOI10.1016/J.PHYSLETA.2012.01.040zbMATH Open1255.94070OpenAlexW1978801065MaRDI QIDQ1933221FDOQ1933221
Authors: Shu-Jiang Xu, Xiu-Bo Chen, Ru Zhang, Yi-Xian Yang, Yu Cui Guo
Publication date: 22 January 2013
Published in: Physics Letters. A (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.physleta.2012.01.040
Recommendations
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map
- An improved block cryptosystem based on iterating chaotic map
- Cryptanalysis and improvement on a cryptosystem based on a chaotic map
- A novel block cryptosystem based on iterating a chaotic map
Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Data encryption (aspects in computer science) (68P25) Cryptography (94A60)
Cites Work
- YET ANOTHER CHAOTIC ATTRACTOR
- A symmetric image encryption scheme based on 3D chaotic cat maps
- A novel block cryptosystem based on iterating a chaotic map
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
- Extended substitution-diffusion based image cipher using chaotic standard map
- Title not available (Why is that?)
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map
- Image encryption using chaotic coupled map lattices with time-varying delays
- Cryptography based on delayed chaotic neural networks
- An improved block cryptosystem based on iterating chaotic map
Cited In (9)
- Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos
- Chaotic image encryption algorithm based on circulant operation
- Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- A novel stream encryption scheme with avalanche effect
- Chaotic map-embedded Blowfish algorithm for security enhancement of colour image encryption
- An improved secure and efficient password and chaos-based two-party key agreement protocol
- A cryptosystem for lossless/lossy grayscale images in IWT domain using chaotic map-based generated key matrices
- A framework to enhance security of physically unclonable functions using chaotic circuits
This page was built for publication: An improved chaotic cryptosystem based on circular bit shift and XOR operations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1933221)