Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme
From MaRDI portal
Publication:3176341
DOI10.1142/S0218127418500864zbMath1393.94917WikidataQ123144253 ScholiaQ123144253MaRDI QIDQ3176341
Simin Yu, Jinhu Lü, Zhuosheng Lin, Xiutao Feng
Publication date: 20 July 2018
Published in: International Journal of Bifurcation and Chaos (Search for Journal in Brave)
chosen-ciphertext attackdivide-and-conquer attackchaotic stream cipherimproved chaotic encryption algorithm
Cryptography (94A60) Additive difference equations (39A10) Chaotic behavior of solutions of difference equations (39A33)
Related Items (5)
Design and Virtex-7-Based Implementation of Video Chaotic Secure Communications ⋮ On the security analysis of a Hopfield chaotic neural network-based image encryption algorithm ⋮ A Pseudorandom Number Generator Based on a 4D Piecewise Logistic Map with Coupled Parameters ⋮ Color Image Encryption with Cipher Feedback and Coupling Chaotic Map ⋮ Cryptanalysis of Some Self-Synchronous Chaotic Stream Ciphers and Their Improved Schemes
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure
- Adaptive lag synchronization and parameters adaptive lag identification of chaotic systems
- Analysis and design of stream ciphers
- Fast correlation attacks on certain stream ciphers
- A new image alternate encryption algorithm based on chaotic map
- Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
- BREAKING A CHAOTIC IMAGE ENCRYPTION ALGORITHM BASED ON MODULO ADDITION AND XOR OPERATION
- A Byte-Based Guess and Determine Attack on SOSEMANUK
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
- A SIMPLE WAY TO SYNCHRONIZE CHAOTIC SYSTEMS WITH APPLICATIONS TO SECURE COMMUNICATION SYSTEMS
- Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers
- DIVIDE AND CONQUER ATTACKS ON CERTAIN CLASSES OF STREAM CIPHERS
- Parameter Identification of Chaotic and Hyper-Chaotic Systems Using Synchronization-Based Parameter Observer
- Chosen ciphertext attack on chaos communication based on chaotic synchronization
- Advances in Cryptology - CRYPTO 2003
This page was built for publication: Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme