A block cipher with dynamic S-boxes based on tent map
From MaRDI portal
Publication:717413
DOI10.1016/j.cnsns.2008.12.005zbMath1221.94068OpenAlexW1964602402WikidataQ122210146 ScholiaQ122210146MaRDI QIDQ717413
Yong Wang, Xiaofeng Liao, Tao Xiang, Kwok-Wo Wong
Publication date: 2 October 2011
Published in: Communications in Nonlinear Science and Numerical Simulation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cnsns.2008.12.005
Cryptography (94A60) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45)
Related Items (26)
Creation of S-box based on a hierarchy of Julia sets: image encryption approach ⋮ A novel method of S-box design based on chaotic map and composition method ⋮ Improved salp swarm algorithm combined with chaos ⋮ Secure image encryption algorithm design using a novel chaos based S-Box ⋮ An extended chaotic maps-based key agreement protocol with user anonymity ⋮ Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol ⋮ A novel method to design S-box based on chaotic map and genetic algorithm ⋮ A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation ⋮ A method for designing strong S-Boxes based on chaotic Lorenz system ⋮ Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table ⋮ Improvement of Rhouma's attacks on Gao algorithm ⋮ A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps ⋮ Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials ⋮ A new digital signature scheme based on chaotic maps ⋮ Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards ⋮ Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map ⋮ Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps ⋮ An efficient online/offline ID-based short signature procedure using extended chaotic maps ⋮ Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing ⋮ A more secure parallel keyed hash function based on chaotic neural network ⋮ Cryptanalysis of a family of self-synchronizing chaotic stream ciphers ⋮ An anonymous key agreement protocol based on chaotic maps ⋮ A novel 1D hybrid chaotic map-based image compression and encryption using compressed sensing and Fibonacci-Lucas transform ⋮ A construction of novel chaos base nonlinear component of block cipher ⋮ Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol ⋮ Substitution box generation using chaos: an image encryption application
Cites Work
- Unnamed Item
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- A fast image encryption scheme based on chaotic standard map
- Differential cryptanalysis of DES-like cryptosystems
- A novel method for designing S-boxes based on chaotic maps
- A method for designing dynamical S-boxes based on discretized chaotic map
- Encryption and decryption of information in chaotic communication systems governed by delay-differential equations
- One-way hash function construction based on 2D coupled map lattices
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
- Selective image encryption using a spatiotemporal chaotic system
- Communication Theory of Secrecy Systems*
- A Secret Key Cryptosystem by Iterating a Chaotic Map
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Cryptosystems with discretized chaotic maps
This page was built for publication: A block cipher with dynamic S-boxes based on tent map