CONTROLLED HENON SYSTEM AND ITS CRYPTOGRAPHIC APPLICATIONS
From MaRDI portal
Publication:3065766
DOI10.1142/S021812741002712XzbMath1202.37064MaRDI QIDQ3065766
Publication date: 6 January 2011
Published in: International Journal of Bifurcation and Chaos (Search for Journal in Brave)
Cryptography (94A60) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Dynamical systems involving homeomorphisms and diffeomorphisms of planes and surfaces (37E30)
Related Items (1)
Cites Work
- Unnamed Item
- Cryptanalysis of a discrete-time synchronous chaotic encryption system
- On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- Secure digital communication using discrete-time chaos synchronization
- Parameter estimation only from the symbolic sequences generated by chaos system
- Breaking projective chaos synchronization secure communication using filtering and generalized synchronization
- Cryptanalysis of an ergodic chaotic cipher
- Cryptanalyzing a discrete-time chaos synchronization secure communication system
- Breaking parameter modulated chaotic secure communication system
- Chaotic encryption using discrete-time synchronous chaos
- Extracting information masked by chaos and contaminated with noise: some considerations on the security of communication approaches using chaos.
- Comments on "Chaotic digital encoding: an approach to secure communication" and reply
- A SIMPLE METHOD TO REVEAL THE PARAMETERS OF THE LORENZ SYSTEM
- IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS
- Encryption and decryption of images with chaotic map lattices
- Communication Theory of Secrecy Systems*
- New directions in cryptography
- TRANSMISSION OF DIGITAL SIGNALS BY CHAOTIC SYNCHRONIZATION
- UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME
- EXPERIMENTAL DEMONSTRATION OF SECURE COMMUNICATIONS VIA CHAOTIC SYNCHRONIZATION
- Communication by chaotic signals: the inverse system approach
- Cryptography based on chaotic systems
- A SIMPLE WAY TO SYNCHRONIZE CHAOTIC SYSTEMS WITH APPLICATIONS TO SECURE COMMUNICATION SYSTEMS
- Controlling chaos
- Designing security for number sequences generated by means of the sawtooth chaotic map
- Chaos in Dynamical Systems
- Synchronization in chaotic systems
- Pseudorandom bits generated by chaotic maps
- A new spatiotemporally chaotic cryptosystem and its security and performance analyses
This page was built for publication: CONTROLLED HENON SYSTEM AND ITS CRYPTOGRAPHIC APPLICATIONS