Cryptanalysis of a chaotic stream cipher and its improved scheme
From MaRDI portal
Publication:3176341
Recommendations
- Cryptanalysis of some self-synchronous chaotic stream ciphers and their improved schemes
- Cryptanalysis of a chaotic block cipher with external key and its improved version
- Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation
- Chosen-ciphertext attack for chaotic self-synchronizing stream cryptosystem
- Cryptanalysis of a family of self-synchronizing chaotic stream ciphers
Cites work
- scientific article; zbMATH DE number 1942441 (Why is no real title available?)
- scientific article; zbMATH DE number 2009966 (Why is no real title available?)
- scientific article; zbMATH DE number 1455102 (Why is no real title available?)
- A SIMPLE WAY TO SYNCHRONIZE CHAOTIC SYSTEMS WITH APPLICATIONS TO SECURE COMMUNICATION SYSTEMS
- A byte-based guess and determine attack on SOSEMANUK
- A new image alternate encryption algorithm based on chaotic map
- Adaptive lag synchronization and parameters adaptive lag identification of chaotic systems
- Advances in Cryptology - CRYPTO 2003
- Analysis and design of stream ciphers
- Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation
- Chosen ciphertext attack on chaos communication based on chaotic synchronization
- Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure
- Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
- DIVIDE AND CONQUER ATTACKS ON CERTAIN CLASSES OF STREAM CIPHERS
- Fast correlation attacks on certain stream ciphers
- Parameter Identification of Chaotic and Hyper-Chaotic Systems Using Synchronization-Based Parameter Observer
- Security analysis of some diffusion mechanisms used in chaotic ciphers
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
Cited in
(14)- Cryptanalysis of a chaotic block cipher with external key and its improved version
- Cryptanalysis of some self-synchronous chaotic stream ciphers and their improved schemes
- On the security analysis of a Hopfield chaotic neural network-based image encryption algorithm
- Color image encryption with cipher feedback and coupling chaotic map
- A pseudorandom number generator based on a 4D piecewise logistic map with coupled parameters
- A related-key attack on iterated chaotic ciphers
- Cryptanalysis of a multiround image encryption algorithm based on 6D self-synchronizing chaotic stream cipher
- Chosen-ciphertext attack for chaotic self-synchronizing stream cryptosystem
- Cryptanalyzing an improved security modulated chaotic encryption scheme using ciphertext absolute value
- Nonsmooth cryptanalysis, with an application to the stream cipher MICKEY
- Cryptanalysis of Chaotic Ciphers
- Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State
- Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
- Design and Virtex-7-based implementation of video chaotic secure communications
This page was built for publication: Cryptanalysis of a chaotic stream cipher and its improved scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3176341)