Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks

[1]  Minghui Du,et al.  A symmetrical image encryption scheme in wavelet and time domain , 2015, Commun. Nonlinear Sci. Numer. Simul..

[2]  Adel Mellit,et al.  Control of chaos in an induction motor system with LMI predictive control and experimental circuit validation , 2017 .

[3]  Sylvain Guilley,et al.  Template attack versus Bayes classifier , 2017, Journal of Cryptographic Engineering.

[4]  Duqu Wei,et al.  A robust image encryption algorithm based on Chua's circuit and compressive sensing , 2019, Signal Process..

[5]  Milan Stehlík,et al.  Missing chaos in global climate change data interpreting , 2016 .

[6]  Wenping Hu,et al.  Design and statistical analysis of a new chaotic block cipher for Wireless Sensor Networks , 2012 .

[7]  Guanrong Chen,et al.  On the security defects of an image encryption scheme , 2009, Image Vis. Comput..

[8]  Zhu Wang,et al.  A Novel Block Encryption Algorithm Based on Chaotic S-Box for Wireless Sensor Network , 2019, IEEE Access.

[9]  Maaruf Ali,et al.  Highly secured chaotic block cipher for fast image encryption , 2014, Appl. Soft Comput..

[10]  Hejiao Huang,et al.  Image Encryption Using Josephus Problem and Filtering Diffusion , 2019, IEEE Access.

[11]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[12]  Sizuya Maekawa,et al.  STUDY ON THE SAMPLING OF CAST IRON FOR CHEMICAL ANALYSIS , 1954 .

[13]  Bart Preneel,et al.  Mutual Information Analysis A Generic Side-Channel Distinguisher , 2008 .

[14]  Edward A. Patrick,et al.  Review of Pattern Recognition in Medical Diagnosis and Consulting Relative to a New System Model , 1974, IEEE Trans. Syst. Man Cybern..

[15]  Dongdong Lin,et al.  Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography , 2017, IEEE MultiMedia.

[16]  Kwok-Wo Wong,et al.  On the Security of a Class of Diffusion Mechanisms for Image Encryption , 2015, IEEE Transactions on Cybernetics.

[17]  Junxiu Liu,et al.  A Double-Image Encryption Scheme Based on Amplitude-Phase Encoding and Discrete Complex Random Transformation , 2018, IEEE Access.

[18]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[19]  Mark Molnar,et al.  Application of chaos theory to biology and medicine , 1992, Integrative physiological and behavioral science : the official journal of the Pavlovian Society.

[20]  Sylvain Guilley,et al.  Optimal side-channel attacks for multivariate leakages and multiple models , 2016, Journal of Cryptographic Engineering.

[21]  Guanrong Chen,et al.  Design and ARM-Embedded Implementation of a Chaotic Map-Based Real-Time Secure Video Communication System , 2015, IEEE Transactions on Circuits and Systems for Video Technology.

[22]  Gang Qu,et al.  New Methods of Template Attack Based on Fault Sensitivity Analysis , 2017, IEEE Transactions on Multi-Scale Computing Systems.

[23]  Yongbin Zhou,et al.  How many interesting points should be used in a template attack? , 2016, J. Syst. Softw..

[24]  Lei Chen,et al.  Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme , 2019, IEEE Access.

[25]  Jim Harkin,et al.  Cryptanalysis and Improvement of a Chaotic Map-Control-Based and the Plain Image-Related Cryptosystem , 2019 .

[26]  Kehui Sun,et al.  A fast image encryption algorithm based on chaotic map , 2016 .

[27]  Xiaohong Zhao,et al.  Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map , 2016, Nonlinear Dynamics.

[28]  Xue Ouyang,et al.  An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems , 2019, IEEE Access.

[29]  Said Fathy El-Zoghdy,et al.  Chaos-based model for encryption and decryption of digital images , 2015, Multimedia Tools and Applications.

[30]  Yicong Zhou,et al.  Two-Dimensional Sine Chaotification System With Hardware Implementation , 2020, IEEE Transactions on Industrial Informatics.

[31]  Zhu Wang,et al.  A novel compound chaotic block cipher for wireless sensor networks , 2015, Commun. Nonlinear Sci. Numer. Simul..

[32]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[33]  Ljupco Kocarev,et al.  Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.