Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography

L Shujun, M Xuanqin, C Yuanlong - … on Cryptology in India Chennai, India …, 2001 - Springer
Chaotic cryptology is widely investigated recently. This paper reviews the progress in this
area and points out some existent problems in digital chaotic ciphers. As a comprehensive …

Multiple grayscale image encryption using cross-coupled chaotic maps

KAK Patro, A Soni, PK Netam, B Acharya - Journal of Information Security …, 2020 - Elsevier
This paper proposes a newly developed multiple grayscale image encryption scheme using
cross-coupling of two Piece-wise Linear Chaotic Maps (PWLCM). In this scheme, cross …

An efficient dual-layer cross-coupled chaotic map security-based multi-image encryption system

KAK Patro, B Acharya - Nonlinear Dynamics, 2021 - Springer
This paper proposes an effective image encryption method to encrypt several images in one
encryption process. The proposed encryption scheme differs from the current multiple image …

On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision

S Li, X Mou, Y Cai, Z Ji, J Zhang - Computer physics communications, 2003 - Elsevier
Zhou et al. have proposed a chaotic encryption scheme, which is based on a kind of
computerized piecewise linear chaotic map (PWLCM) realized in finite computing precision …

Chaotic encryption scheme for real-time digital video

S Li, X Zheng, X Mou, Y Cai - Real-Time Imaging VI, 2002 - spiedigitallibrary.org
In this paper, we propose a novel video encryption scheme based on multiple digital chaotic
systems, which is called CVES (Chaotic Video Encryption Scheme). CVES is independent of …

[PDF][PDF] Analyses and new designs of digital chaotic ciphers

S Li - Ph. D. Dissertation, 2003 - researchgate.net
Since 1980s, the idea of using digital chaotic systems to design new ciphers has attracted
more and more attention. The use of chaos in cryptography depends on the natural relation …

[PDF][PDF] Chaotic map cryptography and security

AN Pisarchik, M Zanin - Encryption: Methods, Software and Security, 2010 - academia.edu
In the last decade, chaos has emerged as a new promising candidate for cryptography
because many chaos fundamental characteristics such as a broadband spectrum …

A chaos-based image encryption algorithm using alternate structure

YW Zhang, YM Wang, XB Shen - Science in China Series F: Information …, 2007 - Springer
Combined with two chaotic maps, a novel alternate structure is applied to image
cryptosystem. In proposed algorithm, a general cat-map is used for permutation and …

Cryptography with chaos and shadowing

N Smaoui, A Kanso - Chaos, Solitons & Fractals, 2009 - Elsevier
In this paper, we present a novel approach to encrypt a message (a text composed by some
alphabets) using chaos and shadowing. First, we generate a numerical chaotic orbit based …

Performance analysis of Jakimoski–Kocarev attack on a class of chaotic cryptosystems

S Li, X Mou, Z Ji, J Zhang, Y Cai - Physics Letters A, 2003 - Elsevier
Recently Jakimoski and Kocarev cryptanalyzed two chaotic cryptosystems without using
chaotic synchronization—Baptista cryptosystem and Alvarez cryptosystem. As a result, they …