Lessons learnt from the cryptanalysis of chaos-based ciphers
From MaRDI portal
Publication:3090973
DOI10.1007/978-3-642-20542-2_8zbMATH Open1221.94039OpenAlexW1502839034MaRDI QIDQ3090973FDOQ3090973
Authors: Gonzalo A. Álvarez, David Arroyo, Shujun Li, José M. Amigó
Publication date: 7 September 2011
Published in: Studies in Computational Intelligence (Search for Journal in Brave)
Full work available at URL: http://epubs.surrey.ac.uk/532425/1/ChaosCrypto_Bookchapter_2011.pdf
Recommendations
Cites Work
- Title not available (Why is that?)
- Deterministic Nonperiodic Flow
- Title not available (Why is that?)
- Period Three Implies Chaos
- Title not available (Why is that?)
- Synchronization in chaotic systems
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Communication Theory of Secrecy Systems*
- Title not available (Why is that?)
- An adaptive chaos synchronization scheme applied to secure communication
- YET ANOTHER CHAOTIC ATTRACTOR
- Cryptanalysis of a discrete chaotic cryptosystem using external key
- Breaking parameter modulated chaotic secure communication system
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
- Chosen ciphertext attack on chaos communication based on chaotic synchronization
- ON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPS
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- Cryptography with chaos
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- Cryptanalysis of Fridrich's chaotic image encryption
- Theory and practice of chaotic cryptography
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- System identification in communication with chaotic systems
- Chaotic encryption using discrete-time synchronous chaos
- Breaking a chaos-based secure communication scheme designed by an improved modulation method
- The role of synchronization in digital communications using chaos. II. Chaotic modulation and chaotic synchronization
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Title not available (Why is that?)
- Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
- Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems
- Cryptanalysis of a family of self-synchronizing chaotic stream ciphers
- A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis
- Image encryption based on a new total shuffling algorithm
- Estimating system parameters of Chua's circuit from synchronizing signal
- UNKNOWN INPUT OBSERVERS FOR MESSAGE-EMBEDDED CHAOS SYNCHRONIZATION OF DISCRETE-TIME SYSTEMS
- An efficient entire chaos-based scheme for deniable authentication
- TRANSMISSION OF DIGITAL SIGNALS BY CHAOTIC SYNCHRONIZATION
- A SIMPLE WAY TO SYNCHRONIZE CHAOTIC SYSTEMS WITH APPLICATIONS TO SECURE COMMUNICATION SYSTEMS
- Robust Chaos
- Recovery of digital signals from chaotic switching
- Synchronization with message embedded for generalized Lorenz chaotic circuits and its error analysis
- Synchronization of Chaotic Systems and Transmission of Information
- Cryptanalysis of an ergodic chaotic cipher
- Cryptanalysis of a chaotic encryption system
- Public-key encryption based on Chebyshev polynomials
- Chaotic block ciphers: from theory to practical algorithms
- Breaking projective chaos synchronization secure communication using filtering and generalized synchronization
- Discrete chaotic cryptography using external key
- Encryption and decryption of images with chaotic map lattices
- A Secret Key Cryptosystem by Iterating a Chaotic Map
- Public-key encryption with chaos
- Discrete Chaos-I: Theory
- Cryptanalysis of a discrete-time synchronous chaotic encryption system
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptography based on chaotic systems
- Communication by chaotic signals: the inverse system approach
- Approximation of a chaotic orbit as a cryptanalytical method on Baptista's cipher
- Breaking an encryption scheme based on chaotic baker map
- Security problems with a chaos-based deniable authentication scheme
- Decoding chaotic cryptography without access to the superkey.
- RETURN-MAP CRYPTANALYSIS REVISITED
- Reconstructing the keystream from a chaotic encryption scheme
- Cryptographically secure substitutions based on the approximation of mixing maps
- Approximations of Dynamical Systems and Their Applications to Cryptography
- Cryptanalysis of a computer cryptography scheme based on a filter bank
- A Class of Maximum-Period Nonlinear Congruential Generators Derived From the Rényi Chaotic Map
- Estimation of the control parameter from symbolic sequences: Unimodal maps with variable critical point
- Modified Baptista type chaotic cryptosystem via matrix secret key
- A revision of the Lyapunov exponent in \(1\)D quadratic maps
- CRYPTANALYSIS OF A NEW CHAOTIC CRYPTOSYSTEM BASED ON ERGODICITY
- A chaos-based approach to the design of cryptographically secure substitutions
- Title not available (Why is that?)
- Coding Scheme Based on Chaos Synchronization from Noninvertible Maps
- Decoding Digital Information from the Cascaded Heterogeneous Chaotic Systems
- A New Approach to Breaking Down Chaotic Secure Communication
- A QUALITATIVE ANALYSIS OF DECIPHERING ERRORS IN CHAOS SHIFT KEYING
- Theoretical and experimental studies of parameter estimation based on chaos feedback synchronization
Cited In (19)
- How to perturb Bernoulli shift map
- Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system
- SOME DESIGN RULES FOR CHAOS-BASED ENCRYPTION SYSTEMS
- Cryptanalysis of Chaotic Ciphers
- PROBLEMS WITH A PROBABILISTIC ENCRYPTION SCHEME BASED ON CHAOTIC SYSTEMS
- A QUALITATIVE ANALYSIS OF DECIPHERING ERRORS IN CHAOS SHIFT KEYING
- Cryptanalysis of a classical chaos-based cryptosystem with some quantum cryptography features
- New pseudo-random number generator based on improved discrete-space chaotic map
- Chaos and cryptography
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Security problems for a pseudorandom sequence generator based on the Chen chaotic system
- Deciphering an image cipher based on 3-cell chaotic map and biological operations
- Secure chaotic system with application to chaotic ciphers
- Title not available (Why is that?)
- Analysis of some recently proposed chaos-based encryption algorithms
- Chaos-based cryptography. A possible solution for information security
- Cryptography with chaotic mixing
- Cryptanalysis of hybrid cryptosystems
- Breaking a novel image encryption scheme based on improved hyperchaotic sequences
This page was built for publication: Lessons learnt from the cryptanalysis of chaos-based ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3090973)