© 2017 World Scientific Publishing Company. As a variant of the substitution-permutation network, the permutation-diffusion structure has received extensive attention in the field of chaotic cryptography over the last three decades. Because of the high implementation speed and nonlinearity over GF(2), the Galois field of two elements, mixing modulo addition/multiplication and Exclusive OR becomes very popular in various designs to achieve the desired diffusion effect. This paper reports that some diffusion mechanisms based on modulo addition/multiplication and Exclusive OR are not resistant to plaintext attacks as claimed. By cracking several recently proposed chaotic ciphers as examples, it is demonstrated that a good understanding of the ...
This work proposes a new secure chaos-based encryption/decryption system, operating in cipher block ...
In recent years, amounts of permutation-diffusion architecture-based image cryptosystems have been p...
International audienceA variety of chaos-based cryptosystems have been investigated during the last ...
none7siDate of Publication: 28 March 2017The need for fast and strong image cryptosystems motivates ...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
The need for fast and strong image cryptosystems motivates researchers to develop new techniques to ...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
The need for fast and strong image cryptosystems motivates researchers to develop new techniques to ...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
© 2017 IEEE. The need for fast and strong image cryptosystems motivates researchers to develop new t...
This work proposes a new secure chaos-based encryption/decryption system, operating in cipher block ...
In recent years, amounts of permutation-diffusion architecture-based image cryptosystems have been p...
International audienceA variety of chaos-based cryptosystems have been investigated during the last ...
none7siDate of Publication: 28 March 2017The need for fast and strong image cryptosystems motivates ...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
In a single substitution box, the same regions (pixels) of an image are encrypted to one unique symb...
The need for fast and strong image cryptosystems motivates researchers to develop new techniques to ...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
The need for fast and strong image cryptosystems motivates researchers to develop new techniques to ...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
© 2017 IEEE. The need for fast and strong image cryptosystems motivates researchers to develop new t...
This work proposes a new secure chaos-based encryption/decryption system, operating in cipher block ...
In recent years, amounts of permutation-diffusion architecture-based image cryptosystems have been p...
International audienceA variety of chaos-based cryptosystems have been investigated during the last ...