An Excellent Permutation Operator for Cryptographic Applications (original) (raw)

Cryptography with chaotic mixing

Marcelo Sobottka

Chaos Solitons & Fractals, 2008

View PDFchevron_right

Fast encryption of image data using chaotic Kolmogorov flows

Josef Scharinger

Journal of Electronic Imaging, 1998

View PDFchevron_right

Chaos for Stream Cipher

Ninan Sajeeth Philip

2001

View PDFchevron_right

Fast encryption of image data using chaotic Kolmogorov flows

Josef Scharinger

Proceedings of SPIE, 1997

View PDFchevron_right

Weak mixing and chaos in nonautonomous discrete systems

Francisco Balibrea

Applied Mathematics Letters, 2012

View PDFchevron_right

Secure and fast encryption using chaotic Kolmogorov flows

Josef Scharinger

1998 Information Theory Workshop (Cat. No.98EX131)

View PDFchevron_right

On the mixing properties of piecewise expanding maps under composition with permutations

Nigel Byott

Discrete and Continuous Dynamical Systems, 2013

View PDFchevron_right

Global measures of distributive mixing and their behavior in chaotic flows

Gerrit Peters

View PDFchevron_right

Chaotic encryption scheme based on a fast permutation and diffusion structure

Yves Effa

Int. Arab J. Inf. Technol., 2017

View PDFchevron_right

The geometry of mixing in 2-d time-periodic chaotic flows

Alessandra Adrover

Chemical Engineering Science, 2000

View PDFchevron_right

Quantification of mixing in aperiodic chaotic flows

fernando muzzio

Chaos, Solitons & Fractals, 1994

View PDFchevron_right

Kolmogorov Stream Ciphers

Josef Scharinger

Lecture Notes in Computer Science, 2009

View PDFchevron_right

Generation of Chaotic Stream Ciphers Using Chaotic Systems

Po-Han Lee

Chinese Journal of Physics, 2003

View PDFchevron_right

Generating Chaotic Stream Ciphers Using Chaotic Systems

Po-Han Lee, Yih-yuh Chen

2003

View PDFchevron_right

Encryption using Deterministic Chaos

Jonathan Blackledge

View PDFchevron_right

Stream cipher systems using a chaotic sequence of i. i. d. random variables

tohru kohda

View PDFchevron_right

Cryptography using multiple one-dimensional chaotic maps

vinod patidar

Communications in Nonlinear Science and Numerical Simulation, 2005

View PDFchevron_right

Cryptanalysis of a one round chaos-based Substitution Permutation Network

David Arroyo

2012

View PDFchevron_right

Cryptographically secure substitutions based on the approximation of mixing maps

Tomasz MichaƂek

IEEE Transactions on Circuits and Systems I: Regular Papers, 2000

View PDFchevron_right

Efficient and Simple Method for Designing Chaotic S-Boxes

Varun Jeoti

Etri Journal, 2008

View PDFchevron_right

Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and PseudoRandom Coding

Shujun Li

2001

View PDFchevron_right

A multidimensional map for a chaotic cryptosystem

Rhouma Rhouma

2008

View PDFchevron_right

Cryptanalysis of a spatiotemporal chaotic cryptosystem

Rhouma Rhouma

Chaos, Solitons & Fractals, 2009

View PDFchevron_right

Chaotic Cryptographic Scheme Based on Composition Maps

Hadi Mahmodi

Eprint Arxiv Nlin 0601051, 2006

View PDFchevron_right