Cryptanalysis of a family of 1D unimodal maps
In this paper, we proposed a topologically conjugate map,equivalent to the well known logistic map. This constructed map is defined on the integer domain [0, 2n) with a view to be used as a random number generator (RNG) based on an integer domain as is the required in classical cryptography. The maps...
| Main Authors: | Md Said, Mohamad Rushdan, Hina, Aliyu Danladi, Banerjee, Santo |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer Verlag
2017
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/61262/ http://psasir.upm.edu.my/id/eprint/61262/1/CRYP.pdf |
Similar Items
Chaotic pseudorandom sequences and the security of cryptosystems
by: Hina, Aliyu Danladi, et al.
Published: (2015)
by: Hina, Aliyu Danladi, et al.
Published: (2015)
Mechanisms of unimodal and cross-modal interference
by: Hirst, Rebecca
Published: (2019)
by: Hirst, Rebecca
Published: (2019)
New directions in cryptanalysis of block ciphers.
by: RezaeiPour , Davood, et al.
Published: (2009)
by: RezaeiPour , Davood, et al.
Published: (2009)
A Kalman Filter Approach for Solving Unimodal Optimization Problems
by: Zuwairie, Ibrahim, et al.
Published: (2015)
by: Zuwairie, Ibrahim, et al.
Published: (2015)
Synchronization between two discrete chaotic systems for secure communications
by: Abdul Fataf, Nur Aisyah, et al.
Published: (2016)
by: Abdul Fataf, Nur Aisyah, et al.
Published: (2016)
Generation and statistical analysis of chaos-based pseudorandom sequences
by: Hina, Aliyu Danladi
Published: (2019)
by: Hina, Aliyu Danladi
Published: (2019)
Cryptanalysis of RSA
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Cryptanalysis of the SHMW signature scheme
by: Lau, Terry Shue Chien, et al.
Published: (2024)
by: Lau, Terry Shue Chien, et al.
Published: (2024)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
History, development and trend of Fractal based biometric cryptography
by: Labu, Md Ahadullah, et al.
Published: (2015)
by: Labu, Md Ahadullah, et al.
Published: (2015)
Algebraic cryptanalysis on the AAβ cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Cryptanalysis of PASS II and MiniPass
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
A framework for describing block cipher cryptanalysis
by: Phan, Raphael C. W., et al.
Published: (2006)
by: Phan, Raphael C. W., et al.
Published: (2006)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
Cryptanalysis using biological inspired computing approaches
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration
by: Phan, Raphael Chung Wei
Published: (2005)
by: Phan, Raphael Chung Wei
Published: (2005)
Cryptanalysis Of The Advanced Encription Standard & Skip Jack
by: Phan, Raphael Chung We
Published: (2002)
by: Phan, Raphael Chung We
Published: (2002)
Cryptanalysis Of The Advanced Encription Standard & Skip Jack
by: Phan, Raphael Chung Wei
Published: (2002)
by: Phan, Raphael Chung Wei
Published: (2002)
An updated cryptanalysis on the BFHP-DLP signing scheme
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2022)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2022)
Degenerating the butterfly attractor in a plasma perturbation model using nonlinear controllers
by: Kadhim, Hayder Natiq, et al.
Published: (2019)
by: Kadhim, Hayder Natiq, et al.
Published: (2019)
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
On the variants of RSA cryptosystem and its related algebraic cryptanalysis
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
by: Yap, Wun She
Published: (2007)
by: Yap, Wun She
Published: (2007)
Enhancing the sensitivity of a chaos sensor for Internet of Things
by: Kadhim, Hayder Natiq, et al.
Published: (2019)
by: Kadhim, Hayder Natiq, et al.
Published: (2019)
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
by: Rezaeipour, Davood
Published: (2011)
by: Rezaeipour, Davood
Published: (2011)
Cryptanalysis on prime power RSA modulus of the form N=prq
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
Cryptanalysis, provable security and implementation of fuzzy identity-based cryptography
by: Tan, Syh Yuan
Published: (2014)
by: Tan, Syh Yuan
Published: (2014)
Designing an M-dimensional nonlinear model for producing hyperchaos
by: Kadhim, Hayder Natiq, et al.
Published: (2018)
by: Kadhim, Hayder Natiq, et al.
Published: (2018)
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
by: Phan, Raphael C.-W., et al.
Published: (2008)
by: Phan, Raphael C.-W., et al.
Published: (2008)
Exponential increment of RSA attack range via lattice based cryptanalysis
by: Nitaj, Abderahmanne, et al.
Published: (2021)
by: Nitaj, Abderahmanne, et al.
Published: (2021)
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
by: Taha, Imad, et al.
Published: (1999)
by: Taha, Imad, et al.
Published: (1999)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
Similar Items
-
Chaotic pseudorandom sequences and the security of cryptosystems
by: Hina, Aliyu Danladi, et al.
Published: (2015) -
Mechanisms of unimodal and cross-modal interference
by: Hirst, Rebecca
Published: (2019) -
New directions in cryptanalysis of block ciphers.
by: RezaeiPour , Davood, et al.
Published: (2009) -
A Kalman Filter Approach for Solving Unimodal Optimization Problems
by: Zuwairie, Ibrahim, et al.
Published: (2015) -
Synchronization between two discrete chaotic systems for secure communications
by: Abdul Fataf, Nur Aisyah, et al.
Published: (2016)