2008
DOI: 10.1016/j.sigpro.2008.04.003
|View full text |Cite
|
Sign up to set email alerts
|

Self-synchronizing chaotic stream ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(25 citation statements)
references
References 21 publications
0
18
0
Order By: Relevance
“…In the cryptosystem described in [2] the transformation of the plaintext into the ciphertext is done bitwise and driven by symbolic sequences generated either by the logistic map or by the tent map. Recall that the logistic map is defined as…”
Section: Description Of the Encryption Schemementioning
confidence: 99%
See 2 more Smart Citations
“…In the cryptosystem described in [2] the transformation of the plaintext into the ciphertext is done bitwise and driven by symbolic sequences generated either by the logistic map or by the tent map. Recall that the logistic map is defined as…”
Section: Description Of the Encryption Schemementioning
confidence: 99%
“…Recently a stream cipher based on the symbolic dynamics of the (one-parameter) logistic map and tent map, was proposed in [2]. If the parameter of either map is selected conveniently, then its symbolic sequences pass all the statistical tests necessary for their consideration as keystreams.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…978-1-4244-4888-3/09/$25.00 ©2009 IEEE where the fun ction qli,j (X m , Y)'s guarantee the error equation Proof: '* Since H(X)m is continuously differentiable, Gli ,j(Y, X m ) can be denoted by (16) dH(X m) dY dt dt (qli,j (Y , X m ) ) . de dt to be asymptotically stable.…”
Section: Generalized Synchronization Theoremmentioning
confidence: 99%
“…The connection between the basic coordinates of cryptography and chaotic systems has paved the research on chaotic cryptography [2]. A lot of different methods have been proposed in the field of chaos-based cryptography [3][4][5][6][7][8], but many of them show very serious security flaws [9][10][11][12][13][14][15]. A very important family of chaotic cryptosystems is the one inheriting the characteristics of the Substitution Permutation Networks (SPNs), as it is explained in [16].…”
Section: Introductionmentioning
confidence: 99%