International audienceThis paper proposes and investigates a Chaotic Cipher Block Chaining mode (CCBC) which is to improve the security of a cryptographic algorithm and more resisting cryptanalysis. The size of both block and key are 512-bits. This approach makes the size of key greater than those of the current Data Encryption Standard (DES) and Advanced Encryption Standard (AES). The security analysis process proves that the proposed algorithm can resist the statistical and differential attacks. It also passed the key sensitivity test. The experimental results on Field Programmable Gate Array (FPGA) show the feasibility and effectiveness of the cryptosystem and indicates the trade-off between secure/performance/efficient and architecture ...
The chaos based cryptographic algorithms have suggested several advantages over the traditional encr...
A genuine encryption/decryption algorithm has been developed by using a new chaotic circuit, namely ...
Abstract — In this paper, we provide possible vulnerabilities of the algorithm set forth by Mohamed ...
International audienceThis paper proposes and investigates a Chaotic Cipher Block Chaining mode (CCB...
Abstract — In this paper, a new Chaotic Map with Block Chaining (CMBC) cryptosystem for image encryp...
This paper introduces an effective image encryption approach that merges a chaotic map and polynomia...
Abstract:- The image encryption is widely used to secure transmission of data in an open internet an...
A recently proposed Chaotic-Key Based Algorithm (CKBA) has been shown to be unavoidably susceptible ...
In this paper, an FPGA implementation of efficient image encryption algorithm using a chaotic map ha...
International audienceDuring the last decade, a variety of chaos-based cryptosystems has been introd...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
Imaging has gained importance due to the improvements of performances in computer speed, media stora...
International audienceIn some previous research works, it has been theoretically proven that RC5-CBC...
International audienceA variety of chaos-based cryptosystems have been investigated during the last ...
International audienceIn the last two decades, several chaos-based cryptosystems have been proposed....
The chaos based cryptographic algorithms have suggested several advantages over the traditional encr...
A genuine encryption/decryption algorithm has been developed by using a new chaotic circuit, namely ...
Abstract — In this paper, we provide possible vulnerabilities of the algorithm set forth by Mohamed ...
International audienceThis paper proposes and investigates a Chaotic Cipher Block Chaining mode (CCB...
Abstract — In this paper, a new Chaotic Map with Block Chaining (CMBC) cryptosystem for image encryp...
This paper introduces an effective image encryption approach that merges a chaotic map and polynomia...
Abstract:- The image encryption is widely used to secure transmission of data in an open internet an...
A recently proposed Chaotic-Key Based Algorithm (CKBA) has been shown to be unavoidably susceptible ...
In this paper, an FPGA implementation of efficient image encryption algorithm using a chaotic map ha...
International audienceDuring the last decade, a variety of chaos-based cryptosystems has been introd...
International audienceThis work proposes a new secure chaos-based encryption/decryption system, oper...
Imaging has gained importance due to the improvements of performances in computer speed, media stora...
International audienceIn some previous research works, it has been theoretically proven that RC5-CBC...
International audienceA variety of chaos-based cryptosystems have been investigated during the last ...
International audienceIn the last two decades, several chaos-based cryptosystems have been proposed....
The chaos based cryptographic algorithms have suggested several advantages over the traditional encr...
A genuine encryption/decryption algorithm has been developed by using a new chaotic circuit, namely ...
Abstract — In this paper, we provide possible vulnerabilities of the algorithm set forth by Mohamed ...