publication . Preprint . 2012

Hybrid Message-Embedded Cipher Using Logistic Map

Mishra, Mina; Mankar, V. H.;
Open Access English
  • Published: 12 Sep 2012
Comment: 10pages,6 figures. arXiv admin note: substantial text overlap with arXiv:1208.1900
arXiv: Computer Science::Cryptography and SecurityComputer Science::Multimedia
free text keywords: Computer Science - Cryptography and Security
Download from

[1] Kocarev L., 2001, “Chaos-based cryptography: A brief overview”, IEEE Circuits Syst. Mag. 1(3), 6- 21. [OpenAIRE]

[2] Jakimoski G. and Kocarev L., 2001, “Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps,” IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications, 48(2), 163-169.

[3] Dachselt F. and Schwarz W., 2001, “Chaos and cryptography,” IEEE Trans. Circuits and Syst. I, 48(6), 1498-1509.

[4] Oliveira de L. P. and Sobottka M., 2008“Cryptography with chaotic mixing,” Chaos, Solutions and Fractals, 35(3), 466-471.

[5] Alvarez G., Montoya F., Romera M., Pastor G., 1999, “Chaotic cryptosystems”, in: L. D. Sanson (Ed.), Proc. 33rd Annual 1999 International Carnahan Conference on Security Technology, IEEE, 332-338.

[6] Millérioux G., Hernandez A., and Amigó J., 2005 “Conventional cryptography and messageembedding,” in Proc. Int. Symp. Nonlinear Theory and its Applications, Bruges, 35, 469-472.

[7] Masuda N. and Aihara K., 2002, “Cryptosystems with discretized chaotic maps,” IEEE Trans. Circuits and Syst. I, 53(6),1341-1352.

[8] Pareek N. K., Patidar V., and Sud K. K., 2007, “Cryptography using multiple one-dimensional chaotic maps,” Communications in Nonlinear Science and Numerical Simulation, 12(5),814-822.

[9] Xianfeng Guo, Jiashu Zhang, Xianfeng Guo, 2010,” An Efficient Cryptanalysis of a Chaotic Cryptosystem and Its Improvement”, IEEE conference on Information Theory and Information Security, China, 578-581.

[10] Ruming Yin, Jian Yuan, Qiuhua Yang, Xiuming Shan, Xiqin Wang, 2009,” Linear cryptanalysis for a chaos-based stream cipher,” World Academy of Science, Engineering and Technology ,60, 799-804. [OpenAIRE]

[11] Alvarez G. and Li S., 2006 “Some basic cryptographic requirements for chaos-based cryptosystems,” Int. J. Bifurc. Chaos, 16(8), 2129-2151.

[12] Anstett F., Millerioux G., and Bloch G., 2005, “Message-embedded cryptosystems: Cryptanalysis and identifiability,” in Proc. 44th IEEE Conf. Decision and Control, 44(3), 2548-2553.

Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue