1999
DOI: 10.1016/s0375-9601(99)00747-1
|View full text |Cite
|
Sign up to set email alerts
|

New approach to chaotic encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
84
0
1

Year Published

2001
2001
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 159 publications
(85 citation statements)
references
References 6 publications
0
84
0
1
Order By: Relevance
“…This is the case of the cryptosystem proposed in [1]. This cryptosystem is based on the tent map and has been cryptanalyzed in [2] and later improved in [3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This is the case of the cryptosystem proposed in [1]. This cryptosystem is based on the tent map and has been cryptanalyzed in [2] and later improved in [3].…”
Section: Introductionmentioning
confidence: 99%
“…This cryptosystem is based on the tent map and has been cryptanalyzed in [2] and later improved in [3]. In [4] a new modification on the original scheme described in [1] was proposed. The authors of this new proposal claim that this modification overcomes all the security problems that were emphasized in [2,3].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, digital chaotic ciphers like those in [3,4,5] and traditional cryptographic techniques such as DES, IDEA and RSA are no longer suitable for practical image encryption, especially for real-time communication scenarios. So far, many chaos-based image cryptosystems have been proposed [6,7,8,9,10].…”
Section: Introductionmentioning
confidence: 99%
“…The growing of research interest in chaos and cryptography has resulted in a number of digital chaotic cryptographic approaches that realize private key cryptography with chaos [1,5,12]. Among those chaotic cryptographic schemes, the one proposed by Baptista [5] has attracted much interest.…”
Section: Introductionmentioning
confidence: 99%