A block cipher with dynamic S-boxes based on tent map
DOI10.1016/J.CNSNS.2008.12.005zbMATH Open1221.94068OpenAlexW1964602402WikidataQ122210146 ScholiaQ122210146MaRDI QIDQ717413FDOQ717413
Authors: Yong Wang, Xiaofeng Liao, Tao Xiang, Kwok-Wo Wong
Publication date: 2 October 2011
Published in: Communications in Nonlinear Science and Numerical Simulation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cnsns.2008.12.005
Recommendations
Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Cryptography (94A60)
Cites Work
- Communication Theory of Secrecy Systems*
- Differential cryptanalysis of DES-like cryptosystems
- Title not available (Why is that?)
- One-way hash function construction based on 2D coupled map lattices
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- A novel method for designing S-boxes based on chaotic maps
- A method for designing dynamical S-boxes based on discretized chaotic map
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- A fast image encryption scheme based on chaotic standard map
- Selective image encryption using a spatiotemporal chaotic system
- A Secret Key Cryptosystem by Iterating a Chaotic Map
- Cryptosystems with discretized chaotic maps
- Encryption and decryption of information in chaotic communication systems governed by delay-differential equations
Cited In (27)
- Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- A construction of novel chaos base nonlinear component of block cipher
- Substitution box generation using chaos: an image encryption application
- Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
- Creation of S-box based on a hierarchy of Julia sets: image encryption approach
- Secure image encryption algorithm design using a novel chaos based S-Box
- Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table
- Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map
- A method for designing strong S-Boxes based on chaotic Lorenz system
- A more secure parallel keyed hash function based on chaotic neural network
- A novel method of S-box design based on chaotic map and composition method
- An anonymous key agreement protocol based on chaotic maps
- Improved salp swarm algorithm combined with chaos
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Cryptanalysis of a family of self-synchronizing chaotic stream ciphers
- Improvement of Rhouma's attacks on Gao algorithm
- A block cipher algorithm based on multidimensional dynamic S-box and LFSR
- A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation
- An extended chaotic maps-based key agreement protocol with user anonymity
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- A novel method to design S-box based on chaotic map and genetic algorithm
- An efficient online/offline ID-based short signature procedure using extended chaotic maps
- A novel 1D hybrid chaotic map-based image compression and encryption using compressed sensing and Fibonacci-Lucas transform
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- A new digital signature scheme based on chaotic maps
This page was built for publication: A block cipher with dynamic S-boxes based on tent map
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q717413)