Cryptanalysis of a chaotic stream cipher and its improved scheme
DOI10.1142/S0218127418500864zbMATH Open1393.94917WikidataQ123144253 ScholiaQ123144253MaRDI QIDQ3176341FDOQ3176341
Authors: Zhuosheng Lin, Simin Yu, Xiutao Feng, Jin-Hu Lü
Publication date: 20 July 2018
Published in: International Journal of Bifurcation and Chaos in Applied Sciences and Engineering (Search for Journal in Brave)
Recommendations
- Cryptanalysis of some self-synchronous chaotic stream ciphers and their improved schemes
- Cryptanalysis of a chaotic block cipher with external key and its improved version
- Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation
- Chosen-ciphertext attack for chaotic self-synchronizing stream cryptosystem
- Cryptanalysis of a family of self-synchronizing chaotic stream ciphers
chosen-ciphertext attackdivide-and-conquer attackchaotic stream cipherimproved chaotic encryption algorithm
Cryptography (94A60) Additive difference equations (39A10) Chaotic behavior of solutions of difference equations (39A33)
Cites Work
- Analysis and design of stream ciphers
- Fast correlation attacks on certain stream ciphers
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- Chosen ciphertext attack on chaos communication based on chaotic synchronization
- Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure
- A new image alternate encryption algorithm based on chaotic map
- Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation
- Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers
- A SIMPLE WAY TO SYNCHRONIZE CHAOTIC SYSTEMS WITH APPLICATIONS TO SECURE COMMUNICATION SYSTEMS
- Adaptive lag synchronization and parameters adaptive lag identification of chaotic systems
- Parameter Identification of Chaotic and Hyper-Chaotic Systems Using Synchronization-Based Parameter Observer
- Title not available (Why is that?)
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
- Title not available (Why is that?)
- DIVIDE AND CONQUER ATTACKS ON CERTAIN CLASSES OF STREAM CIPHERS
- Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
- A byte-based guess and determine attack on SOSEMANUK
Cited In (14)
- Cryptanalysis of Some Self-Synchronous Chaotic Stream Ciphers and Their Improved Schemes
- Cryptanalysis of Chaotic Ciphers
- A related-key attack on iterated chaotic ciphers
- Color Image Encryption with Cipher Feedback and Coupling Chaotic Map
- Chosen-ciphertext attack for chaotic self-synchronizing stream cryptosystem
- Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- Design and Virtex-7-Based Implementation of Video Chaotic Secure Communications
- A Pseudorandom Number Generator Based on a 4D Piecewise Logistic Map with Coupled Parameters
- Cryptanalyzing an improved security modulated chaotic encryption scheme using ciphertext absolute value
- Cryptanalysis of a chaotic block cipher with external key and its improved version
- Nonsmooth cryptanalysis, with an application to the stream cipher MICKEY
- Cryptanalysis of a multiround image encryption algorithm based on 6D self-synchronizing chaotic stream cipher
- On the security analysis of a Hopfield chaotic neural network-based image encryption algorithm
Uses Software
This page was built for publication: Cryptanalysis of a chaotic stream cipher and its improved scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3176341)