2003
DOI: 10.1016/s0375-9601(03)00122-1
|View full text |Cite
|
Sign up to set email alerts
|

Discrete chaotic cryptography using external key

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
110
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 221 publications
(110 citation statements)
references
References 20 publications
0
110
0
Order By: Relevance
“…Many researches in the field of using chaotic maps in cryptography have been developed [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16]. In [2], a cryptosystem, with a symmetric key block cipher, used an external key of variable length (maximum 128-bits) to generate system parameters and initial conditions of the chaotic map.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Many researches in the field of using chaotic maps in cryptography have been developed [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16]. In [2], a cryptosystem, with a symmetric key block cipher, used an external key of variable length (maximum 128-bits) to generate system parameters and initial conditions of the chaotic map.…”
Section: Related Workmentioning
confidence: 99%
“…In [2], a cryptosystem, with a symmetric key block cipher, used an external key of variable length (maximum 128-bits) to generate system parameters and initial conditions of the chaotic map. The ciphertext depends on the secret key only; so to make it robust against any reasonable attack, it uses the feedback technique.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Otherwise, a brute-force attack can be performed on the reduced space of control parameters and initial condition values with a lower computational cost than the one on the key space. A cryptosystem with this problem was introduced in [87] and was later cryptanalyzed in [9].…”
Section: Case Study 824 ([29])mentioning
confidence: 99%
“…Some of them are based on one-dimensional chaotic maps and are applied to data sequence or document encryption [5,6]. For image encryption, two-dimensional (2D) or higher-dimensional chaotic maps are naturally employed as the image can be considered as a 2D array of pixels [7][8][9].…”
Section: Introductionmentioning
confidence: 99%