Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
暂无分享,去创建一个
Gonzalo Álvarez | Shujun Li | S. Li | G. Álvarez | Shujun Li
[1] Hayes,et al. Experimental control of chaos for communication. , 1994, Physical review letters.
[2] D. R. Frey,et al. Chaotic digital encoding: an approach to secure communication , 1993 .
[3] Meng Zhan,et al. Error function attack of chaos synchronization based encryption schemes. , 2003, Chaos.
[4] Leon O. Chua,et al. Spread Spectrum Communication Through Modulation of Chaos , 1993 .
[5] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[6] A. Baranovsky,et al. DESIGN OF ONE-DIMENSIONAL CHAOTIC MAPS WITH PRESCRIBED STATISTICAL PROPERTIES , 1995 .
[7] Leon O. Chua,et al. Spread spectrum Communication through modulation of Chaos in Chua's Circuit , 1993, Chua's Circuit.
[8] Kevin M. Short,et al. Steps Toward Unmasking Secure Communications , 1994 .
[9] J. Cernák. Digital generators of chaos , 1996 .
[10] M. Baptista. Cryptography with chaos , 1998 .
[11] Alan V. Oppenheim,et al. Synchronization of Lorenz-based chaotic circuits with applications to communications , 1993 .
[12] Iwao Sasase,et al. A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.
[13] Ta-lun Yang,et al. Breaking chaotic secure communication using a spectrogram , 1998 .
[14] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[15] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[16] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .
[17] Marco Tomassini,et al. Cryptography with cellular automata , 2001, Appl. Soft Comput..
[18] U. Rajendra Acharya,et al. Reliable and robust transmission and storage of medical images with patient information , 2004, 2004 International Conference on Signal Processing and Communications, 2004. SPCOM '04..
[19] Gelasio Salazar,et al. A cryptosystem based on cellular automata. , 1998, Chaos.
[20] Chao Tao,et al. A New Approach to Breaking Down Chaotic Secure Communication , 2003, Int. J. Bifurc. Chaos.
[21] G. Á. Marañón,et al. Cryptanalysis of a novel cryptosystem based on chaotic oscillators and feedback inversion , 2003, nlin/0311042.
[22] Guanrong Chen,et al. A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.
[23] J. Yorke,et al. Chaos: An Introduction to Dynamical Systems , 1997 .
[24] Xiaowen Li,et al. A new spatiotemporally chaotic cryptosystem and its security and performance analyses. , 2004, Chaos.
[25] Kevin M. Short,et al. Extraction of Signals from Chaotic Laser Data , 1999 .
[26] G Alvarez,et al. Estimating short-time period to break different types of chaotic modulation based secure communications , 2004, nlin/0406039.
[27] P. G. Vaidya,et al. Decoding chaotic cryptography without access to the superkey , 2003 .
[28] Shujun Li,et al. On the security of an image encryption method , 2002, Proceedings. International Conference on Image Processing.
[29] C Zhou,et al. Decoding information by following parameter modulation with parameter adaptive control. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[30] Guanrong Chen,et al. Chaos-Based Encryption for Digital Images and Videos , 2004 .
[31] Leon O. Chua,et al. Transmission of Digital signals by Chaotic Synchronization , 1992, Chua's Circuit.
[32] K. Wong,et al. A secure communication scheme based on the phase synchronization of chaotic systems. , 2003, Chaos.
[33] Gonzalo Álvarez,et al. Breaking network security based on synchronized chaos , 2004, Comput. Commun..
[34] Gang Chen,et al. Cryptanalysis of a New Signal Security System for Multimedia Data Transmission , 2005, EURASIP J. Adv. Signal Process..
[35] Ute Feldmann,et al. Communication by chaotic signals: the inverse system approach , 1995, Proceedings of ISCAS'95 - International Symposium on Circuits and Systems.
[36] Guanrong Chen,et al. On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.
[37] Martin Hasler,et al. Synchronization of chaotic systems and transmission of information , 1998 .
[38] Soo-Chang Pei,et al. Generating Chaotic Stream Ciphers Using Chaotic Systems , 2003 .
[39] U. Parlitz,et al. A SIMPLE METHOD TO REVEAL THE PARAMETERS OF THE LORENZ SYSTEM , 1996 .
[40] Zhen Ji,et al. Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems , 2003, Int. J. Bifurc. Chaos.
[41] Tamar Frankel. [The theory and the practice...]. , 2001, Tijdschrift voor diergeneeskunde.
[42] G. Álvarez,et al. Cryptanalysis of a chaotic encryption system , 2000 .
[43] Xuanqin Mou,et al. Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.
[44] Gonzalo Alvarez,et al. Keystream cryptanalysis of a chaotic cryptographic method , 2004 .
[45] Xiaofeng Liao,et al. A novel method for designing S-boxes based on chaotic maps , 2005 .
[46] M. Bernhard. Introduction to Chaotic Dynamical Systems , 1992 .
[47] Shujun Li,et al. Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher , 2004, ISNN.
[48] Michael Peter Kennedy,et al. Chaos shift keying : modulation and demodulation of a chaotic carrier using self-sychronizing chua"s circuits , 1993 .
[49] Miguel Romera,et al. Cryptanalyzing a discrete-time chaos synchronization secure communication system , 2003, nlin/0311046.
[50] Kenneth D. Lawrence,et al. Modern Statistical Systems and GPSS Simulation , 1992 .
[51] Kwok-Wo Wong,et al. An efficient entire chaos-based scheme for deniable authentication , 2005 .
[52] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[53] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[54] Guanrong Chen,et al. Cryptanalysis of RCES/RSES Image Encryption Scheme , 2004, IACR Cryptol. ePrint Arch..
[55] G. Álvarez,et al. Cryptanalyzing an improved security modulated chaotic encryption scheme using ciphertext absolute value , 2004, nlin/0406065.
[56] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[57] S. M. Shahruz,et al. Design of a novel cryptosystem based on chaotic oscillators and feedback inversion , 2002, Proceedings of the 2003 American Control Conference, 2003..
[58] Leon O. Chua,et al. Secure communication via chaotic parameter modulation , 1996 .
[59] Ta-lun Yang,et al. Breaking chaotic switching using generalized synchronization: examples , 1998 .
[60] Tao Yang,et al. Recovery of digital signals from chaotic switching , 1995, Int. J. Circuit Theory Appl..
[61] Leon O. Chua,et al. Experimental Demonstration of Secure Communications via Chaotic Synchronization , 1992, Chua's Circuit.
[62] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[63] Li-Hai Zhou,et al. A new idea of using one-dimensional PWL map in digital secure communications-dual-resolution approach , 2000 .
[64] Eli Biham,et al. Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91 , 1991, EUROCRYPT.
[65] A. M. Young,et al. Introduction to chaos-based communications and signal processing , 2000, 2000 IEEE Aerospace Conference. Proceedings (Cat. No.00TH8484).
[66] Feng Bao,et al. Cryptanalysis of a New Cellular Automata Cryptosystem , 2003, ACISP.
[67] Maciej Ogorzalek,et al. Identification of chaotic systems based on adaptive synchronization , 1997 .
[68] K. Wong,et al. A Modified Chaotic Cryptographic Method , 2001, Communications and Multimedia Security.
[69] Kevin M. Short,et al. Signal Extraction from Chaotic Communications , 1997 .
[70] Ying-Cheng Lai,et al. Communicating with chaos using two-dimensional symbolic dynamics , 1999 .
[71] Yu Zhang,et al. Decoding Digital Information from the Cascaded Heterogeneous Chaotic Systems , 2003, Int. J. Bifurc. Chaos.
[72] G Alvarez,et al. Breaking a secure communication scheme based on the phase synchronization of chaotic systems. , 2003, Chaos.
[73] Grebogi,et al. Communicating with chaos. , 1993, Physical review letters.
[74] Chang-song Zhou,et al. Extracting information masked by chaos and contaminated with noise: Some considerations on the security of communication approaches using chaos , 1997 .
[75] Tao Yang,et al. A SURVEY OF CHAOTIC SECURE COMMUNICATION SYSTEMS , 2004 .
[76] G. Álvarez,et al. Cryptanalysis of an ergodic chaotic cipher , 2003 .
[77] Chai Wah Wu,et al. A Simple Way to Synchronize Chaotic Systems with Applications to , 1993 .
[78] Ali A. Minai,et al. Communicating with noise: How chaos and noise combine to generate secure encryption keys. , 1998, Chaos.
[79] S. Li,et al. Breaking an encryption scheme based on chaotic baker map , 2004, Physics Letters.
[80] Guanrong Chen,et al. Cryptanalysis of a multistage encryption system , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[81] Cuomo,et al. Circuit implementation of synchronized chaos with applications to communications. , 1993, Physical review letters.
[82] L. Tsimring,et al. Generalized synchronization of chaos in directionally coupled chaotic systems. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[83] P. García,et al. Communication through chaotic map systems , 2002 .
[84] X. Mou,et al. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .
[85] Guanrong Chen,et al. Breaking a chaos-noise-based secure communication scheme. , 2004, Chaos.
[86] Guanrong Chen,et al. Breaking a chaos-based secure communication scheme designed by an improved modulation method , 2004, nlin/0411007.
[87] Chun-Mei Yang,et al. Cryptanalyzing chaotic secure communications using return maps , 1998 .
[88] L. Kocarev,et al. Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .
[89] Gonzalo Alvarez,et al. Chaotic cryptosystems , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[90] Pérez,et al. Extracting messages masked by chaos. , 1995, Physical review letters.
[91] Ljupco Kocarev,et al. Cryptographically secure substitutions based on the approximation of mixing maps , 2005, IEEE Transactions on Circuits and Systems I: Regular Papers.
[92] Guanrong Chen,et al. Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme , 2004, PCM.
[93] S. Bowong. Stability analysis for the synchronization of chaotic systems with different order: application to secure communications , 2004 .
[94] M. Feki. An adaptive chaos synchronization scheme applied to secure communication , 2003 .
[95] G. Álvarez,et al. Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .
[96] Darko Kirovski,et al. Multimedia Security Handbook , 2004 .
[97] Zhi-Hong Guan,et al. Cryptosystem using chaotic keys , 2005 .
[98] Kevin M. Short,et al. UNMASKING A HYPERCHAOTIC COMMUNICATION SCHEME , 1998 .
[99] Ö. Morgül,et al. A chaotic masking scheme by using synchronized chaotic systems , 1999 .
[100] Vinod Patidar,et al. Discrete chaotic cryptography using external key , 2003 .
[101] Gonzalo Álvarez,et al. Breaking two secure communication systems based on chaotic masking , 2004, IEEE Transactions on Circuits and Systems II: Express Briefs.
[102] Changchun Hua,et al. A new chaotic secure communication scheme , 2005 .
[103] Donghui Guo,et al. A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks , 2004, Applied Intelligence.
[104] K. Aihara,et al. Cryptosystems with discretized chaotic maps , 2002 .
[105] Hu Guojie,et al. Chosen ciphertext attack on chaos communication based on chaotic synchronization , 2003 .
[106] Kevin M. Short,et al. UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME , 1996 .
[107] Debin Huang. Synchronization-based estimation of all parameters of chaotic systems from time series. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[108] Z. Ji,et al. Cryptanalysis of a Class of Chaotic Stream Ciphers (一类混沌流密码的分析) , 2003 .
[109] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[110] Gonzalo Álvarez,et al. Breaking cryptography with chaos at the physical level , 2004 .
[111] Qurban A. Memon. Synchronized chaos for network security , 2003, Comput. Commun..
[112] Kwok-Wo Wong,et al. Baptista-type chaotic cryptosystems: problems and countermeasures , 2004, Physics Letters A.
[113] Lingfeng Liu,et al. Estimating system parameters of Chua's circuit from synchronizing signal , 2004 .
[114] Sang Tao,et al. Perturbance-based algorithm to expand cycle length of chaotic key stream , 1998 .
[115] Z. Hong,et al. Generating Chaotic Secure Sequences with Desired Statistical Properties and High Security , 1997 .
[116] G. Álvarez,et al. Breaking parameter modulated chaotic secure communication system , 2003, nlin/0311041.
[117] E. Alvarez,et al. New approach to chaotic encryption , 1999 .
[118] Gonzalo Álvarez,et al. Return-Map Cryptanalysis Revisited , 2005, Int. J. Bifurc. Chaos.
[119] Guanrong Chen,et al. On the security of the Yi-Tan-Siew chaotic cipher , 2004, IEEE Transactions on Circuits and Systems II: Express Briefs.
[120] Ljupco Kocarev,et al. From chaotic maps to encryption schemes , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).
[121] Carlo Harpes,et al. A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma , 1995, EUROCRYPT.
[122] Thomas Beth,et al. Cryptanalysis of Cryptosystems Based on Remote Chaos Replication , 1994, CRYPTO.
[123] Kevin M. Short,et al. Reconstructing the keystream from a chaotic encryption scheme , 2001 .
[124] Hong Zhou,et al. Problems with the chaotic inverse system encryption approach , 1997 .
[125] Robert A. J. Matthews,et al. On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.
[126] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[127] Anastasios Bezerianos,et al. A Probabilistic Symmetric Encryption Scheme for Very Fast Secure Communication Based on Chaotic Systems of difference equations , 2001, Int. J. Bifurc. Chaos.
[128] David Thomas,et al. The Art in Computer Programming , 2001 .
[129] Gonzalo Alvarez,et al. Cryptanalysis of a chaotic secure communication system , 2003 .
[130] Gonzalo Alvarez,et al. Security analysis of communication system based on the synchronization of different order chaotic systems , 2005, nlin/0506056.
[131] Gonzalo Alvarez,et al. Breaking projective chaos synchronization secure communication using filtering and generalized synchronization , 2004, Chaos, Solitons & Fractals.