AbstractIn this paper, two fatal flaws of the cryptosystem which are based on the logistic map and proposed by Y. Wang and T. Xiang are pointed out. According to this, cryptanalysts could recover the plaintext by the chosen plaintext attacked in a short time. Therefore, the authors propose a remedial improvement which can avoid the flaws and enhance the security of the cryptosystem
Abstract—A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
In this paper we construct a new class of nonlinear chaotic maps for secure cryptosystems. These map...
Zhou et al. have proposed a chaotic encryption scheme, which is based on a kind of computerized piec...
AbstractIn this paper, two fatal flaws of the cryptosystem which are based on the logistic map and p...
Abstract A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
Peta camuk berkentuan menghasilkan ciri-ciri seperti determinisme, ergodisiti, perlakuan seperti ra...
Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any m...
In this paper we will first discuss cryptography from a historical point of view in order to under...
Abstract can also be found here (página 2010) Chaotic nonlinear dynamical systems have been widely ...
Abstract—Over last 3 decades, many cryptography algorithms based on chaos have been proposed that ar...
The security of data transmitted over public communication networks and valuable data storage have ...
Recently a chaotic cryptographic scheme based on composition maps was proposed. This paper studies t...
Abstract A chaotic map has sensitivity to changes in the initial conditions and parameters, and a lo...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
The emergence of chaos theory promised a new era in the field of cryptography as the properties of ...
Abstract—A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
In this paper we construct a new class of nonlinear chaotic maps for secure cryptosystems. These map...
Zhou et al. have proposed a chaotic encryption scheme, which is based on a kind of computerized piec...
AbstractIn this paper, two fatal flaws of the cryptosystem which are based on the logistic map and p...
Abstract A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
Peta camuk berkentuan menghasilkan ciri-ciri seperti determinisme, ergodisiti, perlakuan seperti ra...
Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any m...
In this paper we will first discuss cryptography from a historical point of view in order to under...
Abstract can also be found here (página 2010) Chaotic nonlinear dynamical systems have been widely ...
Abstract—Over last 3 decades, many cryptography algorithms based on chaos have been proposed that ar...
The security of data transmitted over public communication networks and valuable data storage have ...
Recently a chaotic cryptographic scheme based on composition maps was proposed. This paper studies t...
Abstract A chaotic map has sensitivity to changes in the initial conditions and parameters, and a lo...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
The emergence of chaos theory promised a new era in the field of cryptography as the properties of ...
Abstract—A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
In this paper we construct a new class of nonlinear chaotic maps for secure cryptosystems. These map...
Zhou et al. have proposed a chaotic encryption scheme, which is based on a kind of computerized piec...