Analysis of some recently proposed chaos-based encryption algorithms

From MaRDI portal
Publication:5950415

DOI10.1016/S0375-9601(01)00771-XzbMath0978.68061MaRDI QIDQ5950415

Ljupčo Kocarev, Goce Jakimoski

Publication date: 11 December 2001

Published in: Physics Letters. A (Search for Journal in Brave)




Related Items (36)

Cryptanalysis of an ergodic chaotic cipherSEARCH-BASED CHAOTIC PSEUDORANDOM BIT GENERATORDynamic properties of an exact algorithm for square root calculationImage encryption algorithm based on chaotic economic modelOCML-based colour image encryptionApplications of tripled chaotic maps in cryptographyHash function based on piecewise nonlinear chaotic mapCryptography with chaos and shadowingKeyed hash function based on a chaotic mapModified Baptista type chaotic cryptosystem via matrix secret keyA novel block cryptosystem based on iterating a chaotic mapCryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithmOn the security of 3D cat map based symmetric image encryption schemeBaptista-type chaotic cryptosystems: problems and countermeasuresA new chaotic cryptosystemCryptography with chaotic mixingPROBLEMS WITH A PROBABILISTIC ENCRYPTION SCHEME BASED ON CHAOTIC SYSTEMSSecurity problems with a chaos-based deniable authentication schemeCryptography with cycling chaosNew chaotic image encryption algorithm based on cross-mappingParameter estimation only from the symbolic sequences generated by chaos systemApproximation of a chaotic orbit as a cryptanalytical method on Baptista's cipherCryptanalysis of a discrete-time synchronous chaotic encryption systemAnalysis and improvement for the performance of Baptista's cryptographic schemeCryptosystem using chaotic keysA modified method of a class of recently presented cryptosystemsOn the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precisionAn image encryption approach based on chaotic mapsA new chaotic algorithm for image encryptionSelf-shrinking chaotic stream ciphersCIPHER SYSTEMS BASED ON CONTROLLED EXACT CHAOTIC MAPSOn the security of a spatiotemporal chaotic cryptosystemIRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONSFREAC-LUT: A NEW DYNAMIC LOOK-UP TABLE APPROACH TO SECURE CHAOTIC ENCRYPTIONPerformance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystemsSecurity analysis of chaotic communication systems based on Volterra--Wiener--Korenberg model



Cites Work


This page was built for publication: Analysis of some recently proposed chaos-based encryption algorithms