Author:
Khan Majid,Shah Tariq,Batool Syeda Iram
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference34 articles.
1. Baptista MS (1998) Cryptography with chaos. Phys Lett A 240:50
2. Alvarez G, Montoya F, Romera M, Pastor G (2003) Cryptanalysis of a chaotic secure communication system. Phys Lett A 306:200
3. Alvarez G, Montoya F, Romera M, Pastor G (2000) Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys Lett A 276:191
4. Alvarez G, Montoya F, Romera M, Pastor G (2004) Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys Lett A 326:211
5. Adams C, Tavares S (1989) Good S-boxes are easy to find. In: Advances in cryptology: proceedings of CRYPTO_89. Lecture notes in computer science, pp 612–615
Cited by
131 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献