• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4660665)   Today's Articles (5538)   Subscriber (51478)
For: Wang X, Zhan M, Lai CH, Gang H. Error function attack of chaos synchronization based encryption schemes. Chaos 2004;14:128-137. [PMID: 15003053 DOI: 10.1063/1.1633492] [Citation(s) in RCA: 8] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/24/2023]
Number Cited by Other Article(s)
1
Antonik P, Gulina M, Pauwels J, Massar S. Using a reservoir computer to learn chaotic attractors, with applications to chaos synchronization and cryptography. Phys Rev E 2018;98:012215. [PMID: 30110744 DOI: 10.1103/physreve.98.012215] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/07/2018] [Indexed: 06/08/2023]
2
Wang X, Zhang W, Guo W, Zhang J. Secure chaotic system with application to chaotic ciphers. Inf Sci (N Y) 2013. [DOI: 10.1016/j.ins.2012.09.037] [Citation(s) in RCA: 46] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
3
Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers. STUDIES IN COMPUTATIONAL INTELLIGENCE 2011. [DOI: 10.1007/978-3-642-20542-2_8] [Citation(s) in RCA: 41] [Impact Index Per Article: 2.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/15/2022]
4
Rhouma R, Safya B. On the security of a spatiotemporal chaotic cryptosystem. CHAOS (WOODBURY, N.Y.) 2007;17:033117. [PMID: 17902999 DOI: 10.1063/1.2756297] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/17/2023]
5
Min L, Shui-Sheng Q. Application of periodic orbit theory in chaos-based security analysis. ACTA ACUST UNITED AC 2007. [DOI: 10.1088/1009-1963/16/8/016] [Citation(s) in RCA: 9] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/12/2022]
6
Wang S, Hu G. Hash function based on chaotic map lattices. CHAOS (WOODBURY, N.Y.) 2007;17:023119. [PMID: 17614673 DOI: 10.1063/1.2735812] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/16/2023]
7
Xiang T, Wong KW, Liao X. Selective image encryption using a spatiotemporal chaotic system. CHAOS (WOODBURY, N.Y.) 2007;17:023115. [PMID: 17614669 DOI: 10.1063/1.2728112] [Citation(s) in RCA: 17] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/16/2023]
8
Anstett F, Millerioux G, Bloch G. Chaotic Cryptosystems: Cryptanalysis and Identifiability. ACTA ACUST UNITED AC 2006. [DOI: 10.1109/tcsi.2006.885979] [Citation(s) in RCA: 32] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
9
Wang X, Gong X, Zhan M, Lai CH. Public-key encryption based on generalized synchronization of coupled map lattices. CHAOS (WOODBURY, N.Y.) 2005;15:23109. [PMID: 16035885 DOI: 10.1063/1.1916207] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/03/2023]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA