Lessons learnt from the cryptanalysis of chaos-based ciphers
From MaRDI portal
Publication:3090973
Recommendations
Cites work
- scientific article; zbMATH DE number 3775877 (Why is no real title available?)
- scientific article; zbMATH DE number 3484411 (Why is no real title available?)
- scientific article; zbMATH DE number 1745909 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- scientific article; zbMATH DE number 1857538 (Why is no real title available?)
- scientific article; zbMATH DE number 774344 (Why is no real title available?)
- scientific article; zbMATH DE number 1406790 (Why is no real title available?)
- scientific article; zbMATH DE number 5587379 (Why is no real title available?)
- A Class of Maximum-Period Nonlinear Congruential Generators Derived From the Rényi Chaotic Map
- A New Approach to Breaking Down Chaotic Secure Communication
- A QUALITATIVE ANALYSIS OF DECIPHERING ERRORS IN CHAOS SHIFT KEYING
- A SIMPLE WAY TO SYNCHRONIZE CHAOTIC SYSTEMS WITH APPLICATIONS TO SECURE COMMUNICATION SYSTEMS
- A Secret Key Cryptosystem by Iterating a Chaotic Map
- A chaos-based approach to the design of cryptographically secure substitutions
- A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis
- A revision of the Lyapunov exponent in \(1\)D quadratic maps
- An adaptive chaos synchronization scheme applied to secure communication
- An efficient entire chaos-based scheme for deniable authentication
- Approximation of a chaotic orbit as a cryptanalytical method on Baptista's cipher
- Approximations of Dynamical Systems and Their Applications to Cryptography
- Breaking a chaos-based secure communication scheme designed by an improved modulation method
- Breaking an encryption scheme based on chaotic baker map
- Breaking parameter modulated chaotic secure communication system
- Breaking projective chaos synchronization secure communication using filtering and generalized synchronization
- CRYPTANALYSIS OF A NEW CHAOTIC CRYPTOSYSTEM BASED ON ERGODICITY
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Chaotic block ciphers: from theory to practical algorithms
- Chaotic encryption using discrete-time synchronous chaos
- Chosen ciphertext attack on chaos communication based on chaotic synchronization
- Coding Scheme Based on Chaos Synchronization from Noninvertible Maps
- Communication Theory of Secrecy Systems*
- Communication by chaotic signals: the inverse system approach
- Cryptanalysis of Fridrich's chaotic image encryption
- Cryptanalysis of a chaotic encryption system
- Cryptanalysis of a computer cryptography scheme based on a filter bank
- Cryptanalysis of a discrete chaotic cryptosystem using external key
- Cryptanalysis of a discrete-time synchronous chaotic encryption system
- Cryptanalysis of a family of self-synchronizing chaotic stream ciphers
- Cryptanalysis of an ergodic chaotic cipher
- Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- Cryptographically secure substitutions based on the approximation of mixing maps
- Cryptography based on chaotic systems
- Cryptography with chaos
- Decoding Digital Information from the Cascaded Heterogeneous Chaotic Systems
- Decoding chaotic cryptography without access to the superkey.
- Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems
- Deterministic Nonperiodic Flow
- Discrete Chaos-I: Theory
- Discrete chaotic cryptography using external key
- Encryption and decryption of images with chaotic map lattices
- Estimating system parameters of Chua's circuit from synchronizing signal
- Estimation of the control parameter from symbolic sequences: Unimodal maps with variable critical point
- Image encryption based on a new total shuffling algorithm
- Modified Baptista type chaotic cryptosystem via matrix secret key
- ON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPS
- Period Three Implies Chaos
- Public-key encryption based on Chebyshev polynomials
- Public-key encryption with chaos
- RETURN-MAP CRYPTANALYSIS REVISITED
- Reconstructing the keystream from a chaotic encryption scheme
- Recovery of digital signals from chaotic switching
- Robust Chaos
- SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS
- Security problems with a chaos-based deniable authentication scheme
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
- Synchronization in chaotic systems
- Synchronization of Chaotic Systems and Transmission of Information
- Synchronization with message embedded for generalized Lorenz chaotic circuits and its error analysis
- System identification in communication with chaotic systems
- TRANSMISSION OF DIGITAL SIGNALS BY CHAOTIC SYNCHRONIZATION
- The role of synchronization in digital communications using chaos. II. Chaotic modulation and chaotic synchronization
- Theoretical and experimental studies of parameter estimation based on chaos feedback synchronization
- Theory and practice of chaotic cryptography
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- UNKNOWN INPUT OBSERVERS FOR MESSAGE-EMBEDDED CHAOS SYNCHRONIZATION OF DISCRETE-TIME SYSTEMS
- YET ANOTHER CHAOTIC ATTRACTOR
Cited in
(19)- Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system
- scientific article; zbMATH DE number 1406790 (Why is no real title available?)
- PROBLEMS WITH A PROBABILISTIC ENCRYPTION SCHEME BASED ON CHAOTIC SYSTEMS
- Chaos-based cryptography. A possible solution for information security
- Chaos and cryptography
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Analysis of some recently proposed chaos-based encryption algorithms
- A QUALITATIVE ANALYSIS OF DECIPHERING ERRORS IN CHAOS SHIFT KEYING
- Cryptanalysis of hybrid cryptosystems
- How to perturb Bernoulli shift map
- Security problems for a pseudorandom sequence generator based on the Chen chaotic system
- Breaking a novel image encryption scheme based on improved hyperchaotic sequences
- Cryptanalysis of a classical chaos-based cryptosystem with some quantum cryptography features
- SOME DESIGN RULES FOR CHAOS-BASED ENCRYPTION SYSTEMS
- Secure chaotic system with application to chaotic ciphers
- Deciphering an image cipher based on 3-cell chaotic map and biological operations
- Cryptanalysis of Chaotic Ciphers
- New pseudo-random number generator based on improved discrete-space chaotic map
- Cryptography with chaotic mixing
This page was built for publication: Lessons learnt from the cryptanalysis of chaos-based ciphers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3090973)