This paper deals with principles of hiding information by chaotic coders and methods of attacking these encryption systems (cryptoanalysis). After a survey of working principles and cryptographical assumptions the attention is focused on public channel chaotic coding systems where principles of the cryptographical analysis are discussed. Finally a discrete-time chaotic encryption systems which has been designed under the condition of public channel and unknown coder structure is treated and two ciphertext-only, public structure attacks are performed. (orig.)Published of Proceedings ISCAS'97, v. II, p. 1061-1064, Hong Kong (HK), 1997SIGLEAvailable from TIB Hannover: RR 7265(97,4) / FIZ - Fachinformationszzentrum Karlsruhe / TIB - Technische ...
International audienceSecurity and confidentiality of image and video data is an important research ...
International audienceSecurity and confidentiality of image and video data is an important research ...
The paper is devoted to analysis of information reticence in communication systems and networks when...
This paper deals with the systematic top down design of discrete-time coder systems for information ...
A systematic top down design of discrete-time continuous-value coder systems for information encrypt...
Recently, low-dimensional chaos-based secure communication systems have attracted a great deal of at...
Recently, low-dimensional chaos-based secure communication systems have attracted a great deal of at...
Part 1 of this paper describes a systematic structural design of a discrete-time encoder-decoder pai...
Germany. Abstract: In this work we comment some conclusions derived from the analysis of recent prop...
This paper investigates the weaknesses of cryptosystems that use observer based synchronized chaotic...
A potential security vulnerability of embedding compression in a chaos-based cryptography is studied...
In this work we comment some conclusions derived from the analysis of recent proposals in the field ...
Nowadays the security of multimedia data storage and transfer is becoming a major concern. The tradi...
International audienceSecurity and confidentiality of image and video data is an important research ...
International audienceSecurity and confidentiality of image and video data is an important research ...
International audienceSecurity and confidentiality of image and video data is an important research ...
International audienceSecurity and confidentiality of image and video data is an important research ...
The paper is devoted to analysis of information reticence in communication systems and networks when...
This paper deals with the systematic top down design of discrete-time coder systems for information ...
A systematic top down design of discrete-time continuous-value coder systems for information encrypt...
Recently, low-dimensional chaos-based secure communication systems have attracted a great deal of at...
Recently, low-dimensional chaos-based secure communication systems have attracted a great deal of at...
Part 1 of this paper describes a systematic structural design of a discrete-time encoder-decoder pai...
Germany. Abstract: In this work we comment some conclusions derived from the analysis of recent prop...
This paper investigates the weaknesses of cryptosystems that use observer based synchronized chaotic...
A potential security vulnerability of embedding compression in a chaos-based cryptography is studied...
In this work we comment some conclusions derived from the analysis of recent proposals in the field ...
Nowadays the security of multimedia data storage and transfer is becoming a major concern. The tradi...
International audienceSecurity and confidentiality of image and video data is an important research ...
International audienceSecurity and confidentiality of image and video data is an important research ...
International audienceSecurity and confidentiality of image and video data is an important research ...
International audienceSecurity and confidentiality of image and video data is an important research ...
The paper is devoted to analysis of information reticence in communication systems and networks when...