[HTML][HTML] Applied cryptography using chaos function for fast digital logic-based systems in ubiquitous computing

PK Shukla, A Khare, MA Rizvi, S Stalin, S Kumar - Entropy, 2015 - mdpi.com
Recently, chaotic dynamics-based data encryption techniques for wired and wireless
networks have become a topic of active research in computer science and network security …

[KNIHA][B] Image encryption: a communication perspective

FE Abd El-Samie, HEH Ahmed, IF Elashry… - 2013 - books.google.com
Presenting encryption algorithms with diverse characteristics, Image Encryption: A
Communication Perspective examines image encryption algorithms for the purpose of …

Cryptanalysis of an ergodic chaotic cipher

G Alvarez, F Montoya, M Romera, G Pastor - Physics letters a, 2003 - Elsevier
In recent years, a growing number of cryptosystems based on chaos have been proposed,
many of them fundamentally flawed by a lack of robustness and security. In this Letter, we …

Baptista-type chaotic cryptosystems: problems and countermeasures

S Li, G Chen, KW Wong, X Mou, Y Cai - Physics Letters A, 2004 - Elsevier
In 1998, MS Baptista proposed a chaotic cryptosystem, which has attracted much attention
from the chaotic cryptography community: some of its modifications and also attacks have …

[PDF][PDF] Analyses and new designs of digital chaotic ciphers

SJ Li - 2003 - openresearch.surrey.ac.uk
Since 1980s, the idea of using digital chaotic systems to design new ciphers has attracted
more and more attention. The use of chaos in cryptography depends on the natural relation …

Cryptanalysis of dynamic look-up table based chaotic cryptosystems

G Alvarez, F Montoya, M Romera, G Pastor - Physics Letters A, 2004 - Elsevier
In recent years many chaotic cryptosystems based on Baptista's seminal work have been
proposed. We analyze the security of two of the newest and most interesting ones, which …

Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations

C Li, S Li, G Alvarez, G Chen, KT Lo - Physics Letters A, 2007 - Elsevier
Recently two encryption schemes were proposed by combining circular bit shift and XOR
operations, under the control of a pseudorandom bit sequence (PRBS) generated from a …

A new image encryption algorithm based on optimized Lorenz chaotic system

T Li, W Yan, Z Chi - Concurrency and Computation: Practice …, 2022 - Wiley Online Library
In this article, an improved Lorenz system was constructed, in the first stage, a nonlinear
term in general Lorenz system was replaced by the sum of term of exponential function and …

A shifted logistic map

A Buscarino, L Fortuna - International Journal of Bifurcation and …, 2023 - World Scientific
In this paper, the peculiarities of a quadratic map are investigated, unveiling the hidden
relationship with the classical logistic map. Moreover, the improvements in generating odd …

A cycling chaos-based cryptic-free algorithm for image steganography

M Aziz, MH Tayarani-N, M Afsar - Nonlinear Dynamics, 2015 - Springer
In recent years, chaotic systems have surfaced to become an important field in
steganographic matters. In this paper, we present a simple cryptic-free least significant bits …