Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers
暂无分享,去创建一个
Gonzalo Álvarez | Shujun Li | José María Amigó | David Arroyo | G. Álvarez | David Arroyo | J. Amigó | Shujun Li
[1] Maciej Ogorzalek,et al. Identification of chaotic systems based on adaptive synchronization , 1997 .
[2] Chao Tao,et al. A New Approach to Breaking Down Chaotic Secure Communication , 2003, Int. J. Bifurc. Chaos.
[3] Leon O. Chua,et al. Transmission of Digital signals by Chaotic Synchronization , 1992, Chua's Circuit.
[4] Gonzalo Alvarez,et al. Cryptanalysis of a discrete-time synchronous chaotic encryption system , 2008 .
[5] José M. Amigó,et al. Chaos-Based Cryptography , 2009, Intelligent Computing Based on Chaos.
[6] Gonzalo Alvarez,et al. Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations , 2006, nlin/0611017.
[7] Shujun Li,et al. Analyses and New Designs of Digital Chaotic Ciphers , 2003 .
[8] Daolin Xu,et al. Chaotic encryption using discrete-time synchronous chaos , 2006 .
[9] Lingfeng Liu,et al. Estimating system parameters of Chua's circuit from synchronizing signal , 2004 .
[10] Ta-lun Yang,et al. Breaking chaotic switching using generalized synchronization: examples , 1998 .
[11] Zengqiang Chen,et al. Image encryption based on a new total shuffling algorithm , 2008 .
[12] Chao Tao,et al. Theoretical and experimental studies of parameter estimation based on chaos feedback synchronization. , 2006, Chaos.
[13] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[14] Gonzalo Alvarez,et al. A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis , 2010, Communications in Nonlinear Science and Numerical Simulation.
[15] E. Lorenz. Deterministic nonperiodic flow , 1963 .
[16] S. Li,et al. Breaking an encryption scheme based on chaotic baker map , 2004, Physics Letters.
[17] Leon O. Chua,et al. Cryptography based on chaotic systems , 1997 .
[18] Gonzalo Alvarez,et al. Keystream cryptanalysis of a chaotic cryptographic method , 2004 .
[19] G. Álvarez,et al. Breaking parameter modulated chaotic secure communication system , 2003, nlin/0311041.
[20] S. V. Fomin,et al. Ergodic Theory , 1982 .
[21] Alan V. Oppenheim,et al. Synchronization of Lorenz-based chaotic circuits with applications to communications , 1993 .
[22] Donald W. Davies,et al. Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.
[23] Wolfgang A. Halang,et al. Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm , 2007, ArXiv.
[24] Massimo Alioto,et al. A Class of Maximum-Period Nonlinear Congruential Generators Derived From the Rényi Chaotic Map , 2007, IEEE Transactions on Circuits and Systems I: Regular Papers.
[25] U. Rajendra Acharya,et al. Reliable and robust transmission and storage of medical images with patient information , 2004, 2004 International Conference on Signal Processing and Communications, 2004. SPCOM '04..
[26] Nikolaos G. Bourbakis,et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..
[27] Christian Storm,et al. Detection and classification of nonlinear dynamic switching events. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[28] Shujun Li,et al. Determination of the Parameters for a Lorenz System and Application to Break the Security of Two-channel Chaotic Cryptosystems , 2008 .
[29] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[30] Alexander L. Fradkov,et al. Adaptive synchronization of chaotic systems based on speed gradient method and passification , 1997 .
[31] Mohd. Salmi Md. Noorani,et al. Modified Baptista type chaotic cryptosystem via matrix secret key , 2008 .
[32] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[33] I. P. Cornfeld. Ergodic theory / I.P. Cornfeld, S.V. Fomin, Ya.G. Sinai , 1982 .
[34] Yu Zhang,et al. Decoding Digital Information from the Cascaded Heterogeneous Chaotic Systems , 2003, Int. J. Bifurc. Chaos.
[35] G Alvarez,et al. Estimating short-time period to break different types of chaotic modulation based secure communications , 2004, nlin/0406039.
[36] Ljupco Kocarev,et al. Chaotic block ciphers: from theory to practical algorithms , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[37] Ljupco Kocarev,et al. Public-key encryption with chaos. , 2004, Chaos.
[38] C. Mira,et al. Coding Scheme Based on Chaos Synchronization from Noninvertible Maps , 1998 .
[39] Ljupco Kocarev,et al. Theory and practice of chaotic cryptography , 2007 .
[40] Xingyuan Wang,et al. A NEW CHAOTIC CRYPTOGRAPHY BASED ON ERGODICITY , 2008 .
[41] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[42] David Arroyo,et al. Application of Gray code to the cryptanalysis of chaotic cryptosystems , 2007 .
[43] L. Kocarev,et al. Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .
[44] Gonzalo Alvarez,et al. Breaking projective chaos synchronization secure communication using filtering and generalized synchronization , 2004, Chaos, Solitons & Fractals.
[45] Miguel Romera,et al. A revision of the Lyapunov exponent in 1D quadratic maps , 1997 .
[46] Gérard Gouesbet,et al. Topological Characterization of Reconstructed Attractors Modding Out Symmetries , 1996 .
[47] Kevin M. Short,et al. UNMASKING A HYPERCHAOTIC COMMUNICATION SCHEME , 1998 .
[48] Pérez,et al. Extracting messages masked by chaos. , 1995, Physical review letters.
[49] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[50] Vinod Patidar,et al. Discrete chaotic cryptography using external key , 2003 .
[51] Daniele Fournier-Prunaret,et al. A Qualitative Analysis of Deciphering Errors in Chaos Shift Keying , 2009, Int. J. Bifurc. Chaos.
[52] Carroll,et al. Synchronization in chaotic systems. , 1990, Physical review letters.
[53] J. Yorke,et al. Period Three Implies Chaos , 1975 .
[54] Gonzalo Álvarez,et al. Return-Map Cryptanalysis Revisited , 2005, Int. J. Bifurc. Chaos.
[55] Enrico Del Re,et al. Stream cipher system based on chaotic maps , 2000, SPIE Optics + Photonics.
[56] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[57] Xuanqin Mou,et al. Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.
[58] M. Hirsch,et al. Differential Equations, Dynamical Systems, and Linear Algebra , 1974 .
[59] Wolfgang A. Halang,et al. Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey , 2007, ArXiv.
[60] Adrian Skrobek,et al. Approximation of a chaotic orbit as a cryptanalytical method on Baptista's cipher , 2008 .
[61] Soumitro Banerjee,et al. Robust Chaos , 1998, chao-dyn/9803001.
[62] David Arroyo Guardeño. Framework for the analysis and design of encryption strategies based on discrete-time chaotic dynamical systems , 2009 .
[63] Safya Belghith,et al. Comment on Modified Baptista type chaotic cryptosystem via matrix secret key [Phys. Lett. A 372 (2008) 5427] , 2009 .
[64] Jamal Daafouz,et al. A connection between chaotic and conventional cryptography , 2008, IEEE Transactions on Circuits and Systems I: Regular Papers.
[65] Meng Zhan,et al. Error function attack of chaos synchronization based encryption schemes. , 2003, Chaos.
[66] José María Amigó,et al. Estimation of the control parameter from symbolic sequences: unimodal maps with variable critical point. , 2009, Chaos.
[67] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[68] P. G. Vaidya,et al. Decoding chaotic cryptography without access to the superkey , 2003 .
[69] Mark Stamp,et al. Applied Cryptanalysis: Breaking Ciphers in the Real World , 2007 .
[70] Guanrong Chen,et al. On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.
[71] Bingo Wing-Kuen Ling,et al. Chaotic filter bank for computer cryptography , 2007 .
[72] Ljupco Kocarev,et al. Cryptographically secure substitutions based on the approximation of mixing maps , 2005, IEEE Transactions on Circuits and Systems I: Regular Papers.
[73] M. Feki. An adaptive chaos synchronization scheme applied to secure communication , 2003 .
[74] Gonzalo Alvarez,et al. Cryptanalysis of a family of self-synchronizing chaotic stream ciphers , 2009, 0903.2928.
[75] Toshimitsu Ushio,et al. Chaos communication using unknown input observers , 2001 .
[76] G. Álvarez,et al. Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .
[77] Guanrong Chen,et al. Breaking a chaos-based secure communication scheme designed by an improved modulation method , 2004, nlin/0411007.
[78] Guanrong Chen,et al. YET ANOTHER CHAOTIC ATTRACTOR , 1999 .
[79] S. Li,et al. On the security of a new image encryption scheme based on chaotic map lattices. , 2008, Chaos.
[80] Kwok-Wo Wong,et al. An efficient entire chaos-based scheme for deniable authentication , 2005 .
[81] Revised December,et al. APPROXIMATIONS OF DYNAMICAL SYSTEMS AND THEIR APPLICATIONS TO CRYPTOGRAPHY , 2003 .
[82] Ljupco Kocarev,et al. Intelligent Computing Based on Chaos , 2009 .
[83] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[84] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[85] Tao Yang,et al. A SURVEY OF CHAOTIC SECURE COMMUNICATION SYSTEMS , 2004 .
[86] G. Álvarez,et al. Cryptanalysis of an ergodic chaotic cipher , 2003 .
[87] Chai Wah Wu,et al. A Simple Way to Synchronize Chaotic Systems with Applications to , 1993 .
[88] Ljupco Kocarev,et al. Public-Key Encryption Based on Chebyshev Polynomials , 2005 .
[89] Tao Yang,et al. Recovery of digital signals from chaotic switching , 1995, Int. J. Circuit Theory Appl..
[90] Gonzalo Álvarez,et al. Analysis of security problems in a medical image encryption system , 2007, Comput. Biol. Medicine.
[91] M. Hasler,et al. Communication by chaotic signals : the inverse system approach , 1996 .
[92] C. Caramanis. What is ergodic theory , 1963 .
[93] G. Álvarez,et al. Cryptanalysis of a chaotic encryption system , 2000 .
[94] Robert A. J. Matthews,et al. On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.
[95] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[96] Kevin M. Short,et al. Reconstructing the keystream from a chaotic encryption scheme , 2001 .
[97] H. Samtleben,et al. Canonical quantization of cylindrical gravitational waves with two polarizations , 1997, gr-qc/9705013.
[98] Jamal Daafouz,et al. Unknown Input Observers for Message-Embedded Chaos Synchronization of Discrete-Time Systems , 2004, Int. J. Bifurc. Chaos.
[99] Henk Nijmeijer,et al. System identification in communication with chaotic systems , 2000 .
[100] Kuang-Yow Lian,et al. Synchronization with message embedded for generalized Lorenz chaotic circuits and its error analysis , 2000 .
[101] Hu Guojie,et al. Chosen ciphertext attack on chaos communication based on chaotic synchronization , 2003 .
[102] Gonzalo Alvarez,et al. Some Hints for the Design of Digital Chaos-Based Cryptosystems: Lessons Learned from Cryptanalysis , 2008, 0812.0765.
[103] Michael Peter Kennedy,et al. The role of synchronization in digital communications using chaos. II. Chaotic modulation and chaotic synchronization , 1998 .
[104] Olcay Taner Yildiz,et al. Cryptanalysis of Fridrich's Chaotic Image Encryption , 2010, Int. J. Bifurc. Chaos.
[105] M. Baptista. Cryptography with chaos , 1998 .
[106] Ta-lun Yang,et al. Breaking chaotic secure communication using a spectrogram , 1998 .
[107] Shujun Li,et al. Cryptanalysis of a new chaotic cryptosystem based on ergodicity , 2008, 0806.3183.
[108] Ljupco Kocarev,et al. A chaos-based approach to the design of cryptographically secure substitutions , 2005 .
[109] Zhong-Ping Jiang,et al. A note on chaotic secure communication systems , 2002 .
[110] Thomas Beth,et al. Cryptanalysis of Cryptosystems Based on Remote Chaos Replication , 1994, CRYPTO.
[111] Martin Hasler,et al. Synchronization of chaotic systems and transmission of information , 1998 .
[112] Michael Peter Kennedy,et al. Chaos shift keying : modulation and demodulation of a chaotic carrier using self-sychronizing chua"s circuits , 1993 .
[113] A. Pisarchik,et al. Encryption and decryption of images with chaotic map lattices. , 2006, Chaos.
[114] Gonzalo Alvarez,et al. Security problems with a chaos-based deniable authentication scheme , 2004, nlin/0412023.
[115] Nicholas J. Higham,et al. INVERSE PROBLEMS NEWSLETTER , 1991 .
[116] Mei Han An,et al. accuracy and stability of numerical algorithms , 1991 .
[117] Chai Wah Wu,et al. Synchronization in Coupled Chaotic Circuits and Systems , 2002 .
[118] Ljupco Kocarev,et al. Discrete Chaos-I: Theory , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[119] G. Álvarez,et al. Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.
[120] Gonzalo Álvarez,et al. Cryptanalysis of a computer cryptography scheme based on a filter bank , 2007, Chaos, Solitons & Fractals.
[121] Iwao Sasase,et al. A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.