Cryptography with chaos
From MaRDI portal
Publication:1966624
DOI10.1016/S0375-9601(98)00086-3zbMath0936.94013OpenAlexW2053111047WikidataQ56866127 ScholiaQ56866127MaRDI QIDQ1966624
Publication date: 8 March 2000
Published in: Physics Letters. A (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/s0375-9601(98)00086-3
Cryptography (94A60) Applications of dynamical systems (37N99) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45)
Related Items (only showing first 100 items - show all)
Cryptanalysis of an ergodic chaotic cipher ⋮ On the dynamics of the \(q\)-deformed logistic map ⋮ Image encryption using \(q\)-deformed logistic map ⋮ Double image multi-encryption algorithm based on fractional chaotic time series ⋮ A provable privacy-protection system for multi-server environment ⋮ A novel color image encryption algorithm based on spatial permutation and quantum chaotic map ⋮ An improved secure and efficient password and chaos-based two-party key agreement protocol ⋮ Dynamic properties of an exact algorithm for square root calculation ⋮ On the dynamics of a discrete difference map in Mann orbit ⋮ Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps ⋮ On the cryptanalysis of two cryptographic algorithms that utilize chaotic neural networks ⋮ Cryptanalysis of a cryptographic scheme based on delayed chaotic neural networks ⋮ Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map ⋮ OCML-based colour image encryption ⋮ Applications of tripled chaotic maps in cryptography ⋮ A novel chaotic block cryptosystem based on iterating map with output-feedback ⋮ Synchronization of the unified chaotic systems using a sliding mode controller ⋮ Hash function based on piecewise nonlinear chaotic map ⋮ Cryptography with chaos and shadowing ⋮ Color image encryption based on one-time keys and robust chaotic maps ⋮ Chaos-based secure satellite imagery cryptosystem ⋮ On some simple examples of mechanical systems with hyperbolic chaos ⋮ A novel symmetrical cryptosystem based on discretized two-dimensional chaotic map ⋮ Theory and practice of chaotic cryptography ⋮ Enhanced cryptography by multiple chaotic dynamics ⋮ Cryptanalysis of the public key encryption based on multiple chaotic systems ⋮ Multimedia security application of a ten-term chaotic system without equilibrium ⋮ A secure image encryption algorithm based on Rubik's cube principle ⋮ A method for designing strong S-Boxes based on chaotic Lorenz system ⋮ Keyed hash function based on a chaotic map ⋮ A chaotic image encryption algorithm based on perceptron model ⋮ Chaotic period-doubling and OGY control for the forced Duffing equation ⋮ An image encryption scheme based on quantum logistic map ⋮ Distributed source coding using chaos-based cryptosystem ⋮ A high accuracy stochastic estimation of a nonlinear deterministic model ⋮ Efficiency and security problems of anonymous key agreement protocol based on chaotic maps ⋮ A novel image encryption algorithm based on a 3D chaotic map ⋮ Security improvement on an anonymous key agreement protocol based on chaotic maps ⋮ A fast image encryption scheme based on chaotic standard map ⋮ Cryptanalysis of a discrete chaotic cryptosystem using external key ⋮ Statistical analysis of symbolic dynamics in weakly coupled chaotic oscillators ⋮ Modified Baptista type chaotic cryptosystem via matrix secret key ⋮ Chaotic encryption using discrete-time synchronous chaos ⋮ A novel block cryptosystem based on iterating a chaotic map ⋮ Chaotic maps-based three-party password-authenticated key agreement scheme ⋮ A chaos-based arbitrated quantum signature scheme in quantum crypotosystem ⋮ Breaking an orbit-based symmetric cryptosystem ⋮ Cryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithm ⋮ Dynamics of coupled generators of quasiperiodic oscillations: different types of synchronization and other phenomena ⋮ A parallel encryption algorithm based on piecewise linear chaotic map ⋮ A new hybrid chaotic map and its application on image encryption and hiding ⋮ Improving the security of chaotic encryption by using a simple modulating method ⋮ Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card ⋮ Baptista-type chaotic cryptosystems: problems and countermeasures ⋮ Hyperbolic chaos in systems based on Fitzhugh-Nagumo model neurons ⋮ Security of public key encryption technique based on multiple chaotic systems ⋮ A new chaotic cryptosystem ⋮ A novel algorithm for image encryption based on mixture of chaotic maps ⋮ A stream cipher based on a spatiotemporal chaotic system ⋮ A novel image encryption scheme based on spatial chaos map ⋮ A high capacity quantum weak blind signature based on logistic chaotic maps ⋮ Image encryption with chaotically coupled chaotic maps ⋮ Cryptography with chaotic mixing ⋮ Cryptanalysis of dynamic look-up table based chaotic cryptosystems ⋮ Security problems with a chaos-based deniable authentication scheme ⋮ Parameter estimation only from the symbolic sequences generated by chaos system ⋮ Cycle detection for secure chaos-based encryption ⋮ A new image encryption algorithm based on hyper-chaos ⋮ Approximation of a chaotic orbit as a cryptanalytical method on Baptista's cipher ⋮ Analysis and improvement for the performance of Baptista's cryptographic scheme ⋮ Cryptosystem using chaotic keys ⋮ A modified method of a class of recently presented cryptosystems ⋮ On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision ⋮ An image encryption approach based on chaotic maps ⋮ Tracing initial conditions, historical evolutionary path and parameters of chaotic processes from a short segment of scalar time series ⋮ Cryptography using multiple one-dimensional chaotic maps ⋮ Synchronizing chaotic map from the two-valued symbolic sequences ⋮ Linear solutions for cryptographic nonlinear sequence generators ⋮ Cryptanalysis of a family of self-synchronizing chaotic stream ciphers ⋮ Self-shrinking chaotic stream ciphers ⋮ Cryptanalysis of a chaos block cipher for wireless sensor network ⋮ An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map ⋮ An improved chaotic cryptosystem with external key ⋮ A block encryption algorithm based on dynamic sequences of multiple chaotic systems ⋮ An improved key agreement protocol based on chaos ⋮ Secure information transfer based on computing reservoir ⋮ Improved chaotic maps-based password-authenticated key agreement using smart cards ⋮ A one-way coupled chaotic map lattice based self-synchronizing stream cipher ⋮ Pseudo-random number generator based on mixing of three chaotic maps ⋮ Application of Gray codes to the study of the theory of symbolic dynamics of unimodal maps ⋮ Chaotic substitution for highly autocorrelated data in encryption algorithm ⋮ Cryptography based on delayed chaotic neural networks ⋮ Symbolic dynamics approach to parameter estimation without initial value ⋮ Cryptanalysis and improvement on a cryptosystem based on a chaotic map ⋮ Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems ⋮ A combined chaotic cryptographic and hashing scheme ⋮ Communication through chaotic map systems ⋮ A fast chaotic cryptographic scheme with dynamic look-up table ⋮ Discrete chaotic cryptography using external key ⋮ A chaotic cryptography scheme for generating short ciphertext
Cites Work
This page was built for publication: Cryptography with chaos