Chen, Baoju; Yu, Simin; Zhang, Zeqing; Li, David Day-Uei; Lü, Jinhu Design and smartphone implementation of chaotic duplex H.264-codec video communications. (English) Zbl 07331757 Int. J. Bifurcation Chaos Appl. Sci. Eng. 31, No. 3, Article ID 2150045, 19 p. (2021). MSC: 68 94A60 PDF BibTeX XML Cite \textit{B. Chen} et al., Int. J. Bifurcation Chaos Appl. Sci. Eng. 31, No. 3, Article ID 2150045, 19 p. (2021; Zbl 07331757) Full Text: DOI
Lin, Zhuosheng; Yu, Simin; Feng, Xiutao; Lü, Jinhu Cryptanalysis of a chaotic stream cipher and its improved scheme. (English) Zbl 1393.94917 Int. J. Bifurcation Chaos Appl. Sci. Eng. 28, No. 7, Article ID 1850086, 27 p. (2018). MSC: 94A60 39A10 39A33 PDF BibTeX XML Cite \textit{Z. Lin} et al., Int. J. Bifurcation Chaos Appl. Sci. Eng. 28, No. 7, Article ID 1850086, 27 p. (2018; Zbl 1393.94917) Full Text: DOI
Yap, Wun-She; Phan, Raphael C.-W.; Yau, Wei-Chuen; Heng, Swee-Huay Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. (English) Zbl 1351.94073 Nonlinear Dyn. 80, No. 3, 1483-1491 (2015). MSC: 94A60 37D45 94A08 PDF BibTeX XML Cite \textit{W.-S. Yap} et al., Nonlinear Dyn. 80, No. 3, 1483--1491 (2015; Zbl 1351.94073) Full Text: DOI
Yang, Yang; Jin, Chenhui A related-key attack on iterated chaotic ciphers. (English) Zbl 1171.94362 Kybernetika 44, No. 4, 501-510 (2008). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Yang} and \textit{C. Jin}, Kybernetika 44, No. 4, 501--510 (2008; Zbl 1171.94362) Full Text: Link EuDML
Zhang, Bin; Feng, Dengguo Security analysis of a new stream cipher. (English) Zbl 1100.94018 Sci. China, Ser. F. 49, No. 3, 286-301 (2006). MSC: 94A60 94A55 11T71 65C10 PDF BibTeX XML Cite \textit{B. Zhang} and \textit{D. Feng}, Sci. China, Ser. F 49, No. 3, 286--301 (2006; Zbl 1100.94018) Full Text: DOI
Chen, K.; Simpson, L.; Henricksen, M.; Millan, W.; Dawson, E. A complete divide and conquer attack on the Alpha1 stream cipher. (English) Zbl 1092.94502 Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 418-431 (2004). MSC: 94A60 PDF BibTeX XML Cite \textit{K. Chen} et al., Lect. Notes Comput. Sci. 2971, 418--431 (2004; Zbl 1092.94502) Full Text: DOI
Schindler, Werner; Koeune, François; Quisquater, Jean-Jacques Improving divide and conquer attacks against cryptosystems by better error detection: correction strategies. (English) Zbl 0998.94545 Honary, Bahram (ed.), Cryptography and coding. 8th IMA international conference, Cirencester, GB, December 17-19, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2260, 245-267 (2001). MSC: 94A60 PDF BibTeX XML Cite \textit{W. Schindler} et al., Lect. Notes Comput. Sci. 2260, 245--267 (2001; Zbl 0998.94545) Full Text: DOI
Simpson, L.; Golić, J. Dj; Dawson, E. A probabilistic correlation attack on the shrinking generator. (English) Zbl 0931.94039 Boyd, Colin (ed.) et al., Information security and privacy. 3rd Australasian conference, ACISP ’98, Brisbane, Australia, July 13–15, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1438, 147-158 (1998). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{L. Simpson} et al., Lect. Notes Comput. Sci. 1438, 147--158 (1998; Zbl 0931.94039)
Dawson, Ed; Clark, Andrew Divide and conquer attacks on certain classes of stream ciphers. (English) Zbl 0833.94014 Cryptologia 18, No. 1, 25-40 (1994). MSC: 94A60 68W10 PDF BibTeX XML Cite \textit{E. Dawson} and \textit{A. Clark}, Cryptologia 18, No. 1, 25--40 (1994; Zbl 0833.94014) Full Text: DOI