Some basic cryptographic requirements for chaos-based cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been
published. However, many of the proposed schemes fail to explain or do not possess a …
published. However, many of the proposed schemes fail to explain or do not possess a …
A novel chaotic image encryption scheme using DNA sequence operations
XY Wang, YQ Zhang, XM Bao - Optics and Lasers in Engineering, 2015 - Elsevier
In this paper, we propose a novel image encryption scheme based on DNA
(Deoxyribonucleic acid) sequence operations and chaotic system. Firstly, we perform bitwise …
(Deoxyribonucleic acid) sequence operations and chaotic system. Firstly, we perform bitwise …
Synchronization and communication with chaotic laser systems
A Uchida, F Rogister, J Garcia-Ojalvo, R Roy - Progress in optics, 2005 - Elsevier
Publisher Summary This chapter reviews the progress in the field of synchronization and
communication with chaotic laser systems. The origin of chaotic dynamics in lasers is …
communication with chaotic laser systems. The origin of chaotic dynamics in lasers is …
Security analysis of a chaos-based image encryption algorithm
S Lian, J Sun, Z Wang - Physica A: Statistical Mechanics and its …, 2005 - Elsevier
The security of Fridrich's algorithm against brute-force attack, statistical attack, known-
plaintext attack and select-plaintext attack is analyzed by investigating the properties of the …
plaintext attack and select-plaintext attack is analyzed by investigating the properties of the …
Selective image encryption using a spatiotemporal chaotic system
A universal selective image encryption algorithm, in which the spatiotemporal chaotic
system is utilized, is proposed to encrypt gray-level images. In order to resolve the tradeoff …
system is utilized, is proposed to encrypt gray-level images. In order to resolve the tradeoff …
Using a reservoir computer to learn chaotic attractors, with applications to chaos synchronization and cryptography
Using the machine learning approach known as reservoir computing, it is possible to train
one dynamical system to emulate another. We show that such trained reservoir computers …
one dynamical system to emulate another. We show that such trained reservoir computers …
An improved key agreement protocol based on chaos
X Wang, J Zhao - Communications in Nonlinear Science and Numerical …, 2010 - Elsevier
Cryptography based on chaos theory has developed fast in the past few years, but most of
the researches focus on secret key cryptography. There are few public key encryption …
the researches focus on secret key cryptography. There are few public key encryption …
[图书][B] Progress in optics
E Wolf - 2005 - books.google.com
In this volume, six review articles which cover a broad range of topics of current interest in
modern optics are included. The first article by S. Saltiel, AA Sukhorukov and YS Kivshar …
modern optics are included. The first article by S. Saltiel, AA Sukhorukov and YS Kivshar …
An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map
EJ Yoon, IS Jeon - Communications in Nonlinear Science and Numerical …, 2011 - Elsevier
This paper proposes a new efficient and secure Diffie–Hellman key agreement protocol
based on Chebyshev chaotic map. The proposed key agreement protocol uses the semi …
based on Chebyshev chaotic map. The proposed key agreement protocol uses the semi …
Lessons learnt from the cryptanalysis of chaos-based ciphers
Introduction The idea of using chaotic transformations in cryptography is explicit in the
foundational papers of Shannon on secrecy systems (eg,[96]). Although the word “chaos” …
foundational papers of Shannon on secrecy systems (eg,[96]). Although the word “chaos” …