Yap, Wun-She; Phan, Raphael C.-W.; Yau, Wei-Chuen; Heng, Swee-Huay Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. (English) Zbl 1351.94073 Nonlinear Dyn. 80, No. 3, 1483-1491 (2015). MSC: 94A60 37D45 94A08 PDFBibTeX XMLCite \textit{W.-S. Yap} et al., Nonlinear Dyn. 80, No. 3, 1483--1491 (2015; Zbl 1351.94073) Full Text: DOI
Zhang, Yushu; Li, Yantao; Wen, Wenying; Wu, Yongfei; Chen, Jun-xin Deciphering an image cipher based on 3-cell chaotic map and biological operations. (English) Zbl 1441.94034 Nonlinear Dyn. 82, No. 4, 1831-1837 (2015). MSC: 94A08 94A60 PDFBibTeX XMLCite \textit{Y. Zhang} et al., Nonlinear Dyn. 82, No. 4, 1831--1837 (2015; Zbl 1441.94034) Full Text: DOI
Liu, Yuansheng; Fan, Hua; Xie, Eric Yong; Cheng, Ge; Li, Chengqing Deciphering an image cipher based on mixed transformed logistic maps. (English) Zbl 1330.94042 Int. J. Bifurcation Chaos Appl. Sci. Eng. 25, No. 13, Article ID 1550188, 9 p. (2015). MSC: 94A60 37E05 PDFBibTeX XMLCite \textit{Y. Liu} et al., Int. J. Bifurcation Chaos Appl. Sci. Eng. 25, No. 13, Article ID 1550188, 9 p. (2015; Zbl 1330.94042) Full Text: DOI arXiv
Barwell, Guy; Page, Daniel; Stam, Martijn Rogue decryption failures: reconciling AE robustness notions. (English) Zbl 1376.94026 Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 94-111 (2015). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{G. Barwell} et al., Lect. Notes Comput. Sci. 9496, 94--111 (2015; Zbl 1376.94026) Full Text: DOI Link
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi Improved linear sieving techniques with applications to step-reduced LED-64. (English) Zbl 1382.94090 Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 390-410 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Dinur} et al., Lect. Notes Comput. Sci. 8540, 390--410 (2015; Zbl 1382.94090) Full Text: DOI
Sen Gupta, Sourav; Maitra, Subhamoy; Meier, Willi; Paul, Goutam; Sarkar, Santanu Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA. (English) Zbl 1382.94117 Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 350-369 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Sen Gupta} et al., Lect. Notes Comput. Sci. 8540, 350--369 (2015; Zbl 1382.94117) Full Text: DOI
Das, Angsuman; Adhikari, Avishek; Sakurai, Kouichi Plaintext checkable encryption with designated checker. (English) Zbl 1331.94052 Adv. Math. Commun. 9, No. 1, 37-53 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Das} et al., Adv. Math. Commun. 9, No. 1, 37--53 (2015; Zbl 1331.94052) Full Text: DOI