E Solak - Chaos-Based Cryptography: Theory, Algorithms and …, 2011 - Springer
Introduction Cryptanalysis is an integral part of any serious effort in designing secure encryption algorithms. Indeed, a cryptosystem is only as secure as the most powerful known …
AN Pisarchik, M Zanin - Encryption: Methods, Software and Security, 2010 - academia.edu
In the last decade, chaos has emerged as a new promising candidate for cryptography because many chaos fundamental characteristics such as a broadband spectrum …
JS Teh, M Alawida, YC Sii - Journal of Information Security and Applications, 2020 - Elsevier
Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios …
In this work we comment some conclusions derived from the analysis of recent proposals in the field of chaos-based cryptography. These observations remark a number of major …
G Alvarez, F Montoya, M Romera, G Pastor - Physics letters a, 2003 - Elsevier
In recent years, a growing number of cryptosystems based on chaos have been proposed, many of them fundamentally flawed by a lack of robustness and security. In this Letter, we …
S Li - Ph. D. Dissertation, 2003 - researchgate.net
Since 1980s, the idea of using digital chaotic systems to design new ciphers has attracted more and more attention. The use of chaos in cryptography depends on the natural relation …
J Fridrich - International Journal of Bifurcation and chaos, 1998 - World Scientific
In this paper, methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption schemes. A chaotic map is …
JM Amigó - Intelligent computing based on chaos, 2009 - Springer
Introduction The story of chaos-based or “chaotic” cryptography is remarkable, for several reasons. To begin with, it appeared outside conventional cryptography, first as an …
G Jakimoski, L Kocarev - … transactions on circuits and systems i …, 2001 - ieeexplore.ieee.org
This paper is devoted to the analysis of the impact of chaos-based techniques on block encryption ciphers. We present several chaos based ciphers. Using the well-known …