Some basic cryptographic requirements for chaos-based cryptosystems

G Alvarez, S Li - International journal of bifurcation and chaos, 2006 - World Scientific
In recent years, a large amount of work on chaos-based cryptosystems have been
published. However, many of the proposed schemes fail to explain or do not possess a …

A novel chaotic image encryption scheme using DNA sequence operations

XY Wang, YQ Zhang, XM Bao - Optics and Lasers in Engineering, 2015 - Elsevier
In this paper, we propose a novel image encryption scheme based on DNA
(Deoxyribonucleic acid) sequence operations and chaotic system. Firstly, we perform bitwise …

Synchronization and communication with chaotic laser systems

A Uchida, F Rogister, J Garcia-Ojalvo, R Roy - Progress in optics, 2005 - Elsevier
Publisher Summary This chapter reviews the progress in the field of synchronization and
communication with chaotic laser systems. The origin of chaotic dynamics in lasers is …

Security analysis of a chaos-based image encryption algorithm

S Lian, J Sun, Z Wang - Physica A: Statistical Mechanics and its …, 2005 - Elsevier
The security of Fridrich's algorithm against brute-force attack, statistical attack, known-
plaintext attack and select-plaintext attack is analyzed by investigating the properties of the …

Selective image encryption using a spatiotemporal chaotic system

T Xiang, K Wong, X Liao - Chaos: An Interdisciplinary Journal of …, 2007 - pubs.aip.org
A universal selective image encryption algorithm, in which the spatiotemporal chaotic
system is utilized, is proposed to encrypt gray-level images. In order to resolve the tradeoff …

Using a reservoir computer to learn chaotic attractors, with applications to chaos synchronization and cryptography

P Antonik, M Gulina, J Pauwels, S Massar - Physical Review E, 2018 - APS
Using the machine learning approach known as reservoir computing, it is possible to train
one dynamical system to emulate another. We show that such trained reservoir computers …

An improved key agreement protocol based on chaos

X Wang, J Zhao - Communications in Nonlinear Science and Numerical …, 2010 - Elsevier
Cryptography based on chaos theory has developed fast in the past few years, but most of
the researches focus on secret key cryptography. There are few public key encryption …

[图书][B] Progress in optics

E Wolf - 2005 - books.google.com
In this volume, six review articles which cover a broad range of topics of current interest in
modern optics are included. The first article by S. Saltiel, AA Sukhorukov and YS Kivshar …

An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map

EJ Yoon, IS Jeon - Communications in Nonlinear Science and Numerical …, 2011 - Elsevier
This paper proposes a new efficient and secure Diffie–Hellman key agreement protocol
based on Chebyshev chaotic map. The proposed key agreement protocol uses the semi …

Lessons learnt from the cryptanalysis of chaos-based ciphers

G Alvarez, JM Amigó, D Arroyo, S Li - Chaos-Based Cryptography: Theory …, 2011 - Springer
Introduction The idea of using chaotic transformations in cryptography is explicit in the
foundational papers of Shannon on secrecy systems (eg,[96]). Although the word “chaos” …