Cryptography with chaos

From MaRDI portal
Publication:1966624

DOI10.1016/S0375-9601(98)00086-3zbMath0936.94013OpenAlexW2053111047WikidataQ56866127 ScholiaQ56866127MaRDI QIDQ1966624

Murilo S. Baptista

Publication date: 8 March 2000

Published in: Physics Letters. A (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/s0375-9601(98)00086-3




Related Items (only showing first 100 items - show all)

Cryptanalysis of an ergodic chaotic cipherOn the dynamics of the \(q\)-deformed logistic mapImage encryption using \(q\)-deformed logistic mapDouble image multi-encryption algorithm based on fractional chaotic time seriesA provable privacy-protection system for multi-server environmentA novel color image encryption algorithm based on spatial permutation and quantum chaotic mapAn improved secure and efficient password and chaos-based two-party key agreement protocolDynamic properties of an exact algorithm for square root calculationOn the dynamics of a discrete difference map in Mann orbitCryptanalysis of a cryptosystem using multiple one-dimensional chaotic mapsOn the cryptanalysis of two cryptographic algorithms that utilize chaotic neural networksCryptanalysis of a cryptographic scheme based on delayed chaotic neural networksCryptanalysis and improvement on a block cryptosystem based on iteration a chaotic mapOCML-based colour image encryptionApplications of tripled chaotic maps in cryptographyA novel chaotic block cryptosystem based on iterating map with output-feedbackSynchronization of the unified chaotic systems using a sliding mode controllerHash function based on piecewise nonlinear chaotic mapCryptography with chaos and shadowingColor image encryption based on one-time keys and robust chaotic mapsChaos-based secure satellite imagery cryptosystemOn some simple examples of mechanical systems with hyperbolic chaosA novel symmetrical cryptosystem based on discretized two-dimensional chaotic mapTheory and practice of chaotic cryptographyEnhanced cryptography by multiple chaotic dynamicsCryptanalysis of the public key encryption based on multiple chaotic systemsMultimedia security application of a ten-term chaotic system without equilibriumA secure image encryption algorithm based on Rubik's cube principleA method for designing strong S-Boxes based on chaotic Lorenz systemKeyed hash function based on a chaotic mapA chaotic image encryption algorithm based on perceptron modelChaotic period-doubling and OGY control for the forced Duffing equationAn image encryption scheme based on quantum logistic mapDistributed source coding using chaos-based cryptosystemA high accuracy stochastic estimation of a nonlinear deterministic modelEfficiency and security problems of anonymous key agreement protocol based on chaotic mapsA novel image encryption algorithm based on a 3D chaotic mapSecurity improvement on an anonymous key agreement protocol based on chaotic mapsA fast image encryption scheme based on chaotic standard mapCryptanalysis of a discrete chaotic cryptosystem using external keyStatistical analysis of symbolic dynamics in weakly coupled chaotic oscillatorsModified Baptista type chaotic cryptosystem via matrix secret keyChaotic encryption using discrete-time synchronous chaosA novel block cryptosystem based on iterating a chaotic mapChaotic maps-based three-party password-authenticated key agreement schemeA chaos-based arbitrated quantum signature scheme in quantum crypotosystemBreaking an orbit-based symmetric cryptosystemCryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithmDynamics of coupled generators of quasiperiodic oscillations: different types of synchronization and other phenomenaA parallel encryption algorithm based on piecewise linear chaotic mapA new hybrid chaotic map and its application on image encryption and hidingImproving the security of chaotic encryption by using a simple modulating methodImprovement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart cardBaptista-type chaotic cryptosystems: problems and countermeasuresHyperbolic chaos in systems based on Fitzhugh-Nagumo model neuronsSecurity of public key encryption technique based on multiple chaotic systemsA new chaotic cryptosystemA novel algorithm for image encryption based on mixture of chaotic mapsA stream cipher based on a spatiotemporal chaotic systemA novel image encryption scheme based on spatial chaos mapA high capacity quantum weak blind signature based on logistic chaotic mapsImage encryption with chaotically coupled chaotic mapsCryptography with chaotic mixingCryptanalysis of dynamic look-up table based chaotic cryptosystemsSecurity problems with a chaos-based deniable authentication schemeParameter estimation only from the symbolic sequences generated by chaos systemCycle detection for secure chaos-based encryptionA new image encryption algorithm based on hyper-chaosApproximation of a chaotic orbit as a cryptanalytical method on Baptista's cipherAnalysis and improvement for the performance of Baptista's cryptographic schemeCryptosystem using chaotic keysA modified method of a class of recently presented cryptosystemsOn the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precisionAn image encryption approach based on chaotic mapsTracing initial conditions, historical evolutionary path and parameters of chaotic processes from a short segment of scalar time seriesCryptography using multiple one-dimensional chaotic mapsSynchronizing chaotic map from the two-valued symbolic sequencesLinear solutions for cryptographic nonlinear sequence generatorsCryptanalysis of a family of self-synchronizing chaotic stream ciphersSelf-shrinking chaotic stream ciphersCryptanalysis of a chaos block cipher for wireless sensor networkAn efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic mapAn improved chaotic cryptosystem with external keyA block encryption algorithm based on dynamic sequences of multiple chaotic systemsAn improved key agreement protocol based on chaosSecure information transfer based on computing reservoirImproved chaotic maps-based password-authenticated key agreement using smart cardsA one-way coupled chaotic map lattice based self-synchronizing stream cipherPseudo-random number generator based on mixing of three chaotic mapsApplication of Gray codes to the study of the theory of symbolic dynamics of unimodal mapsChaotic substitution for highly autocorrelated data in encryption algorithmCryptography based on delayed chaotic neural networksSymbolic dynamics approach to parameter estimation without initial valueCryptanalysis and improvement on a cryptosystem based on a chaotic mapPerformance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystemsA combined chaotic cryptographic and hashing schemeCommunication through chaotic map systemsA fast chaotic cryptographic scheme with dynamic look-up tableDiscrete chaotic cryptography using external keyA chaotic cryptography scheme for generating short ciphertext



Cites Work


This page was built for publication: Cryptography with chaos