Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations

From MaRDI portal
Publication:715909

DOI10.1016/j.physleta.2007.04.023zbMath1209.94044arXivnlin/0611017OpenAlexW2166809149WikidataQ121161344 ScholiaQ121161344MaRDI QIDQ715909

Gonzalo Alvarez, Shujun Li, Kwok-Tung Lo, Guan-Rong Chen, Cheng-Qing Li

Publication date: 19 April 2011

Published in: Physics Letters. A (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/nlin/0611017




Related Items (20)

BREAKING AN IMAGE ENCRYPTION ALGORITHM BASED ON CHAOSRevisiting quantum authentication scheme based on entanglement swappingAn improved secure and efficient password and chaos-based two-party key agreement protocolBreaking a chaotic image encryption algorithm based on perceptron modelAn improved chaotic cryptosystem based on circular bit shift and XOR operationsSecure multiparty quantum secret sharing with the collective eavesdropping-check characterA scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportationCryptanalysis of a spatiotemporal chaotic image/video cryptosystem and its improved versionSecurity improvement on an anonymous key agreement protocol based on chaotic mapsQuantum deniable authentication protocolCryptanalysis of an image encryption scheme based on the hill cipherA DESIGN OF PSEUDO-RANDOM BIT GENERATOR BASED ON SINGLE CHAOTIC SYSTEMQuantum conferenceDeciphering an Image Cipher Based on Mixed Transformed Logistic MapsOptimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacksBreaking a modified substitution-diffusion image cipher based on chaotic standard and logistic mapsAn anonymous key agreement protocol based on chaotic mapsCONTROLLED HENON SYSTEM AND ITS CRYPTOGRAPHIC APPLICATIONSBREAKING A CHAOTIC CRYPTOGRAPHIC SCHEME BASED ON COMPOSITION MAPSLessons Learnt from the Cryptanalysis of Chaos-Based Ciphers


Uses Software


Cites Work


This page was built for publication: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations