Abstract—A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-term forecast becomes impossible by iterations of a chaotic map. These features look similar to the properties of the cryptology. For that reason, it is effective to use chaotic maps for cryptosystems. In this research, we propose a cryptosystem using iterations of a chaotic map. This cryptosystem uses expansion map for encryption and decryption. This cryptosystem is a symmetric-key cryptography that has a public key. We investigate the vulnerability of this cryptosystem. I
A cryptosystem using a simple one-dimensional chaotic map has been proposed [1]. This system perform...
AbstractIn this paper, two fatal flaws of the cryptosystem which are based on the logistic map and p...
Chaos-based stream ciphers form a prospective class of data encryption techniques. Usually, in chaos...
Abstract A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
Abstract A chaotic map has sensitivity to changes in the initial conditions and parameters, and a lo...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
A chaotic map has various features. A chaotic map has sen-sitivity to a change in initial conditions...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
Includes bibliographical references (pages 59-60).The study of chaotic maps has become increasingly ...
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaoti...
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaoti...
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic...
A cryptosystem using a simple one-dimensional chaotic map has been proposed [1]. This system perform...
AbstractIn this paper, two fatal flaws of the cryptosystem which are based on the logistic map and p...
Chaos-based stream ciphers form a prospective class of data encryption techniques. Usually, in chaos...
Abstract A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
Abstract A chaotic map has sensitivity to changes in the initial conditions and parameters, and a lo...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
A chaotic map has various features. A chaotic map has sen-sitivity to a change in initial conditions...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
Includes bibliographical references (pages 59-60).The study of chaotic maps has become increasingly ...
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaoti...
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaoti...
Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic...
A cryptosystem using a simple one-dimensional chaotic map has been proposed [1]. This system perform...
AbstractIn this paper, two fatal flaws of the cryptosystem which are based on the logistic map and p...
Chaos-based stream ciphers form a prospective class of data encryption techniques. Usually, in chaos...