Recently, an image encryption scheme based on chaotic standard and logistic maps was proposed by Patidar et al. It was later reported by Rhouma et al. that an equivalent secret key can be reconstructed with only one known/chosen-plaintext and the corresponding ciphertext. Patidar et al. soon modified the original scheme and claimed that the modified scheme is secure against Rhouma et al.'s attack. In this paper, we point out that the modified scheme is still insecure against the same known/chosen-plaintext attack. In addition, some other security defects existing in both the original and the modified schemes are also reported
This paper describes the security weakness of a recently proposed image encryption algorithm based o...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
In 2019, Essaid et al. introduced a chaotic map-based encryption scheme for color images. Their appr...
Recently, an image encryption scheme based on chaotic standard and logistic maps was proposed by Pat...
This paper introduces two different types of attacks on a recently proposed cryptosystem based on ch...
International audienceIn the recent literature, many research studies have proven that Known and Cho...
Wang and Guo (Nonlinear Dyn 76(4):1943–1950, 2014) proposed a new image alternate encryption algorit...
This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integr...
Since John von Neumann suggested utilizing Logistic map as a random number generator in 1947, a grea...
Substitution box is a unique and nonlinear core component of block ciphers. A better designing techn...
This paper studies the security of a recently-proposed image encryption scheme based on chaos, and p...
In current years many chaos-based Substitution boxes (S-boxes) have been proposed. Recently, an imag...
This paper studies the security of a recently-proposed chaos-based image encryption scheme and point...
Recently, to conquer most non-plain related chaos-based image cryptosystems’ security flaws th...
Recently, a new chaotic image encryption technique was proposed based on multiple discrete dynamic m...
This paper describes the security weakness of a recently proposed image encryption algorithm based o...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
In 2019, Essaid et al. introduced a chaotic map-based encryption scheme for color images. Their appr...
Recently, an image encryption scheme based on chaotic standard and logistic maps was proposed by Pat...
This paper introduces two different types of attacks on a recently proposed cryptosystem based on ch...
International audienceIn the recent literature, many research studies have proven that Known and Cho...
Wang and Guo (Nonlinear Dyn 76(4):1943–1950, 2014) proposed a new image alternate encryption algorit...
This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integr...
Since John von Neumann suggested utilizing Logistic map as a random number generator in 1947, a grea...
Substitution box is a unique and nonlinear core component of block ciphers. A better designing techn...
This paper studies the security of a recently-proposed image encryption scheme based on chaos, and p...
In current years many chaos-based Substitution boxes (S-boxes) have been proposed. Recently, an imag...
This paper studies the security of a recently-proposed chaos-based image encryption scheme and point...
Recently, to conquer most non-plain related chaos-based image cryptosystems’ security flaws th...
Recently, a new chaotic image encryption technique was proposed based on multiple discrete dynamic m...
This paper describes the security weakness of a recently proposed image encryption algorithm based o...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
In 2019, Essaid et al. introduced a chaotic map-based encryption scheme for color images. Their appr...