Implementation and practical problems of chaos-based cryptography revisited
Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios are minimal as compared to conventional cryptography. Chaotic maps have been used in the design of cryptosystems becaus...
Uložené v:
| Vydané v: | Journal of information security and applications Ročník 50; s. 102421 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Elsevier Ltd
01.02.2020
|
| Predmet: | |
| ISSN: | 2214-2126 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios are minimal as compared to conventional cryptography. Chaotic maps have been used in the design of cryptosystems because they depict desirable characteristics such as pseudorandomness, complexity, and sensitivity to parameter changes. Despite these characteristics being analogous to cryptographic requirements, the resulting chaos-based cryptosystems are usually difficult to analyze, inefficient, and have reproducibility issues. In this paper, we highlight some of the problems which deter the practical application of chaos-based cryptosystems. We show that recently published work in reputable journals still do not address these problems and remain only of academic interest. We also perform experiments to depict some of the implementation issues of digital chaos that need to be taken into consideration when designing chaos-based algorithms. We then discuss a number of possible solutions that can be explored to overcome these problems. |
|---|---|
| AbstractList | Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios are minimal as compared to conventional cryptography. Chaotic maps have been used in the design of cryptosystems because they depict desirable characteristics such as pseudorandomness, complexity, and sensitivity to parameter changes. Despite these characteristics being analogous to cryptographic requirements, the resulting chaos-based cryptosystems are usually difficult to analyze, inefficient, and have reproducibility issues. In this paper, we highlight some of the problems which deter the practical application of chaos-based cryptosystems. We show that recently published work in reputable journals still do not address these problems and remain only of academic interest. We also perform experiments to depict some of the implementation issues of digital chaos that need to be taken into consideration when designing chaos-based algorithms. We then discuss a number of possible solutions that can be explored to overcome these problems. |
| ArticleNumber | 102421 |
| Author | Teh, Je Sen Sii, You Cheng Alawida, Moatsum |
| Author_xml | – sequence: 1 givenname: Je Sen orcidid: 0000-0001-5571-4148 surname: Teh fullname: Teh, Je Sen email: jesen_teh@usm.my – sequence: 2 givenname: Moatsum orcidid: 0000-0001-8146-5843 surname: Alawida fullname: Alawida, Moatsum – sequence: 3 givenname: You Cheng surname: Sii fullname: Sii, You Cheng |
| BookMark | eNp9kMtqwzAQRbVIoWmaH-jKP-BUkiVjQTcl9BEa6CZ7MZZGjYxjGUkE8vd1cFddZDXDXM7APQ9kMYQBCXlidMMoq5-7TecTbDhlajpwwdmCLDlnouSM1_dknVJHKWWcKcmrJfnancYeTzhkyD4MBQy2GCOY7A300xbaKU1FcIU5QkhlCwltYeJlzOEnwni8FBHPPvmM9pHcOegTrv_mihze3w7bz3L__bHbvu5LU9V1LgVV1rZUCNE0qpKVtAosYKsosNYpLqhoZd1UUkrnWFsLZOAcuBqlQnDVivD5rYkhpYhOj9GfIF40o_oqQXf6KkFfJehZwgQ1_yDj58o5gu9voy8zilOns8eok_E4GLQ-osnaBn8L_wWcFX1o |
| CitedBy_id | crossref_primary_10_1016_j_ins_2022_08_102 crossref_primary_10_1186_s42400_024_00319_4 crossref_primary_10_1109_ACCESS_2024_3372136 crossref_primary_10_1109_ACCESS_2022_3165565 crossref_primary_10_1109_TII_2024_3523548 crossref_primary_10_1140_epjp_s13360_023_04224_6 crossref_primary_10_1109_ACCESS_2020_3002763 crossref_primary_10_1109_ACCESS_2021_3060861 crossref_primary_10_1109_JPHOT_2020_3044222 crossref_primary_10_1145_3614433 crossref_primary_10_1155_2021_6615708 crossref_primary_10_1016_j_jestch_2020_02_007 crossref_primary_10_1155_2021_8824915 crossref_primary_10_1631_FITEE_2300755 crossref_primary_10_1108_AEAT_10_2024_0300 crossref_primary_10_1109_ACCESS_2022_3173338 crossref_primary_10_3389_fams_2022_1100839 crossref_primary_10_1088_1402_4896_ad75c5 crossref_primary_10_1007_s12652_022_04107_1 crossref_primary_10_1088_1674_1056_ac6335 crossref_primary_10_1007_s11042_024_18628_8 crossref_primary_10_1109_TIFS_2024_3390995 crossref_primary_10_1109_ACCESS_2022_3145005 crossref_primary_10_1109_ACCESS_2021_3054250 crossref_primary_10_1109_JLT_2022_3226768 crossref_primary_10_1109_ACCESS_2021_3049881 crossref_primary_10_51537_chaos_1214569 crossref_primary_10_1088_1402_4896_adb523 crossref_primary_10_1155_2020_7647421 crossref_primary_10_1109_ACCESS_2024_3407654 crossref_primary_10_51537_chaos_1250317 crossref_primary_10_1007_s00371_021_02066_w crossref_primary_10_1109_JETCAS_2021_3077023 crossref_primary_10_1007_s11071_020_05504_x crossref_primary_10_1109_ACCESS_2020_3012912 |
| Cites_doi | 10.1007/s00521-015-2158-7 10.1007/978-3-642-20542-2_8 10.1016/j.physleta.2006.05.038 10.1007/s11071-011-0006-6 10.1016/j.image.2019.08.014 10.1007/s10586-018-02895-w 10.1109/12.280803 10.1007/s11071-018-4426-4 10.1016/j.optlaseng.2018.11.015 10.3745/JIPS.2013.9.2.271 10.1016/j.chaos.2006.09.047 10.1007/978-3-642-20542-2_6 10.1007/s11071-019-04802-3 10.1109/ACCESS.2018.2886384 10.1007/s11071-018-4076-6 10.1007/s11071-014-1492-0 10.3390/sym10070266 10.1109/TCSI.2004.842870 10.1016/j.chaos.2016.04.007 10.1016/j.optcom.2009.09.070 10.1155/2017/9040518 10.1109/ACCESS.2018.2867111 10.1007/s13319-017-0123-1 10.1007/s11042-019-7453-3 10.1177/1077546317734712 10.4018/IJRSDA.2018040107 10.1007/s11071-019-04771-7 10.1016/j.sigpro.2018.06.008 10.1142/S0129183113501052 10.1016/j.optlaseng.2019.04.011 10.1007/s13319-017-0154-7 10.1016/j.optlaseng.2019.04.005 10.1007/s00500-018-3112-2 10.1016/j.ins.2018.12.048 10.1007/s11071-014-1816-0 10.1007/s11071-012-0628-3 10.3390/sym11070853 10.1016/j.optlastec.2019.105698 10.1016/j.sigpro.2018.09.029 10.1016/j.ins.2011.09.008 10.1007/s11042-018-6022-5 10.3390/info9070160 10.1007/s41870-018-0199-8 10.1016/j.sigpro.2018.02.028 10.1007/s11042-019-7235-y 10.1016/j.ifacol.2018.11.406 10.1142/S0218127406015507 10.1007/s11071-015-1932-5 10.1016/j.optcom.2012.07.106 10.1016/j.sigpro.2019.06.013 10.1007/s11071-013-1018-1 10.1103/PhysRevLett.95.098702 10.1260/1748-3018.4.2.167 10.1007/s11071-016-3024-6 10.1007/s11042-019-7282-4 10.1016/j.sigpro.2018.03.010 10.1007/s11277-015-2896-y 10.1016/j.ins.2015.03.050 10.1109/ACCESS.2018.2817600 10.1109/MMUL.2018.112142439 10.1109/TCSI.2006.874182 10.1016/j.optlastec.2019.02.009 10.1007/s10586-017-1062-6 10.1155/2012/767364 10.1140/epjst/e2014-02185-y 10.1007/s11071-017-3656-1 10.1016/j.optlaseng.2018.12.002 10.1016/j.cnsns.2013.08.032 10.1109/MMUL.2018.2873472 10.1007/s11042-018-7081-3 10.1007/s00521-017-2993-9 10.1016/j.physa.2006.11.002 10.1016/j.cnsns.2009.02.033 10.1016/j.eswa.2017.12.003 10.1016/j.sigpro.2017.11.005 10.1016/j.sigpro.2019.03.022 10.1016/j.camwa.2010.03.017 10.1016/j.sigpro.2019.02.016 10.1016/j.sigpro.2016.12.008 10.1109/TCE.2004.1309431 10.1186/1687-6180-2013-126 10.1007/s11042-017-4953-x 10.1140/epjp/i2017-11819-7 10.1103/PhysRevLett.90.047903 10.1016/j.sigpro.2017.07.034 10.1016/j.chaos.2017.09.025 10.1016/j.ins.2012.06.001 10.1007/s11042-018-7110-2 10.1016/j.cnsns.2012.06.019 10.1016/j.optlastec.2018.09.048 10.1109/ACCESS.2018.2871557 10.1371/journal.pone.0153870 10.1007/s11071-019-04809-w |
| ContentType | Journal Article |
| Copyright | 2019 Elsevier Ltd |
| Copyright_xml | – notice: 2019 Elsevier Ltd |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.jisa.2019.102421 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | 10_1016_j_jisa_2019_102421 S2214212619306544 |
| GroupedDBID | --M .~1 1~. 4.4 457 4G. 5VS 7-5 8P~ AACTN AAEDT AAEDW AAFJI AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABMAC ABXDB ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AIALX AIEXJ AIKHN AITUG AJBFU AJOXV AKYCK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK AOUOD AVARZ AXJTR BKOJK BLXMC EBS EFJIC EFLBG EJD FDB FIRID FNPLU FYGXN GBLVA GBOLZ KOM M41 MO0 OAUVE P-8 P-9 PC. PRBVW RIG ROL SPC SPCBC SSB SSO SSV SSZ T5K ~G- AATTM AAXKI AAYWO AAYXX ACLOT ACVFH ADCNI AEIPS AEUPX AFJKZ AFPUW AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS |
| ID | FETCH-LOGICAL-c366t-409ddb04448893535d9adaeb90a1bf92404b5683555ff1b64e1affaf6e59eaf3 |
| ISICitedReferencesCount | 73 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000505033600010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2214-2126 |
| IngestDate | Tue Nov 18 22:32:05 EST 2025 Wed Nov 05 21:01:19 EST 2025 Fri Feb 23 02:48:28 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Cryptanalysis Image encryption Cryptography Security Chaos theory Authentication |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c366t-409ddb04448893535d9adaeb90a1bf92404b5683555ff1b64e1affaf6e59eaf3 |
| ORCID | 0000-0001-8146-5843 0000-0001-5571-4148 |
| ParticipantIDs | crossref_primary_10_1016_j_jisa_2019_102421 crossref_citationtrail_10_1016_j_jisa_2019_102421 elsevier_sciencedirect_doi_10_1016_j_jisa_2019_102421 |
| PublicationCentury | 2000 |
| PublicationDate | February 2020 2020-02-00 |
| PublicationDateYYYYMMDD | 2020-02-01 |
| PublicationDate_xml | – month: 02 year: 2020 text: February 2020 |
| PublicationDecade | 2020 |
| PublicationTitle | Journal of information security and applications |
| PublicationYear | 2020 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Chai, Gan, Yuan, Chen, Liu (bib0023) 2017; 31 Alvarez, Amigó, Arroyo, Li (bib0122) 2011 Solak, Rhouma, Belghith (bib0047) 2010; 283 Aoki, Ichikawa, Kanda, Matsui, Moriai, Nakajima, Tokita (bib0121) 2001 zkaynak, zer, Yavuz (bib0048) 2012; 285 Li, Lu, Xiang, Zhang, Ren (bib0053) 2019; 96 Lu, Li, Zhang, Yang (bib0111) 2016; 11 Khedr WI. A new efficient and configurable image encryption structure for secure transmission. Multimed Tools Appl. doi Bertoni, Daemen, Peeters, Assche (bib0100) 2008 Wang, Xiao, Chen, Huang (bib0051) 2018; 144 François, Grosges, Barchiesi, Erra (bib0084) 2014; 19 Vidal, Baptista, Mancini (bib0070) 2014; 223 Lee, Phan, Yap, Goi (bib0059) 2018; 92 Akhavan, Samsudin, Akhshani (bib0095) 2013 Liu, Tang, Liu, Zhang, Ma (bib0020) 2018; 97 Alvarez, Li (bib0034) 2009; 14 Alawida, Teh, Samsudin, Alshoura (bib0045) 2019; 164 Yu W, Liu Y, Gong L, Tian M, Tu L. Double-image encryption based on spatiotemporal chaos and DNA operations. Multimed Tools Appl. doi Wang, Zhao, Wang (bib0010) 2019; 115 Teh, Samsudin (bib0060) 2017; 2017 Essaid, Akharraz, Saaidi, Mouhib (bib0005) 2019; 47 Hosseinzadeh, Zarebnia, Parvaz (bib0009) 2019; 120 Verma, Nizam, Ahmad (bib0043) 2013; 9 García-Martínez, Campos-Cantón (bib0083) 2014; 25 Kanso, Yahyaoui, Almulla (bib0090) 2012; 186 Kyrtsou, Labys (bib0001) 2007; 377 Chain, Kuo (bib0106) 2013; 74 . Ahmad, Solami, Wang, Doja, Beg, Alzaidi (bib0057) 2018; 10 Ahmad, Doja, Beg (bib0082) 2018 Ahmad, Alam, Ansari, Lambić, AlSharari (bib0058) 2018; 34 Ahmad M, Khurana S, Singh S, AlSharari HD. A simple secure hash function scheme using multiple chaotic maps. 3D Research 8(2). doi Ahmad, Ahmad (bib0050) 2014; 12 Li, Peng, Li, Zhu (bib0021) 2018; 94 Chai, Fu, Gan, Lu, Chen (bib0063) 2019; 155 Liu, Xia, Wang (bib0079) 2017; 24 Li, Lin, Lu, Hao (bib0052) 2018; 25 Masuda, Jakimoski, Aihara, Kocarev (bib0037) 2006; 53 Gong, Li, Shi (bib0110) 2012; 70 Ye, Wong (bib0026) 2012; 71 Bahrami, Naderi (bib0027) 2012; 2012 Li, Lu, Wen, Ren, Zhang (bib0055) 2018; 6 Long, Tan (bib0029) 2010 Ahmad M, Doja M, Beg MS. Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. J King Saud Univ-ComputInf Sci. Li, Xiao, Deng (bib0093) 2012; 214 Alzaidi, Ahmad, Doja, Solami, Beg (bib0108) 2018; 6 Satish, Jayakar, Tobin, Madhavi, Murali (bib0032) 2004; 50 Sharafi, Fotouhi-Ghazvini, Shirali, Ghassemian (bib0116) 2019; 7 Alawida M, Samsudin A, Teh JS. Enhancing unimodal digital chaotic maps through hybridisation. Nonlinear Dyn doi Wu, Liao, Yang (bib0065) 2018; 153 Soleymani S.H., Taherinia A.H., Mohajerzadeh A.H.. WACA: A new blind robust watermarking method based on arnold cat map and amplified pseudo-noise strings with weak correlation. Multimed Tools Appl doi Howell (bib0033) 1990; 3 Hua, Jin, Xu, Huang (bib0038) 2018; 149 Clark, Weng (bib0088) 1994; 43 Xu, Sun, Cao, Zhu (bib0115) 2019; 121 Norouzi, Mirzakuchaki (bib0025) 2014; 78 Bahi, Guyeux (bib0089) 2010; 4 Sheludko (bib0069) 2018; 51 Zhang (bib0075) 2008; 37 Zhang Y. Test and verification of AES used for image encryption. 3D Research 9(1). doi Solís-Sánchez, Barrantes (bib0078) 2018; 9 Lambić, Nikolić (bib0086) 2017; 90 Kandar, Chaudhuri, Bhattacharjee, Dhara (bib0041) 2019; 44 Zhang, Wang, Zhou (bib0101) 2016 Meshram, Li, Meshram (bib0107) 2018; 23 Li, Li, Liu (bib0097) 2016; 28 Luo, Yu, Lai, Liu (bib0046) 2019; 78 Ahmad M, Singh S, Khurana S. Cryptographic one-way hash function generation using twelve-terms 4d nonlinear system. Int J Inf Technol doi Shannon (bib0036) 1945 zrk, Kılıç (bib0085) 2015; 80 Xiong Z, Wu Y, Ye C, Zhang X, Xu F. Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl doi Luo, Lin, Liu, Wei, Cao, Zhou (bib0008) 2019; 161 Bertoni, Daemen, Peeters, Assche (bib0099) 2013 Tenny, Tsimring (bib0077) 2005; 52 Xie, Hu, Wu (bib0112) 2014; 79 Ahmad, Ahmad (bib0109) 2018; 5 Çavuşoğlu, Akgl, Zengin, Pehlivan (bib0080) 2017; 104 Hu, Liu, Gong, Guo, Yuan (bib0064) 2017; 134 Lin Z, Guyeux C, Yu S, Wang Q, Cai S. On the use of chaotic iterations to design keyed hash function. Cluster Comput doi Li, Fan, Xiang, Li, Zhang (bib0054) 2018; 25 Submission (bib0118) 2018 Artiles, Chaves, Pimentel (bib0040) 2019; 79 Tenny R, Tsimring LS, Larson L, Abarbanel HDI. Using distributed nonlinear dynamics for public key encryption. Phys Rev Lett 90(4). doi Nesa, Ghosh, Banerjee (bib0004) 2019; 47 Huang, Cai, Xiong, Xiao (bib0042) 2019; 115 Hu, Liu, Gong, Ouyang (bib0024) 2016; 87 Wang, Zhao, Feng, Ye, Zhang (bib0044) 2019; 122 Patro, Acharya (bib0039) 2018; 40 Valli, Ganesan (bib0104) 2017; 132 Chai, Fu, Gan, Lu, Chen (bib0003) 2019; 155 Chenaghlu, Jamali, Khasmakhi (bib0094) 2016; 87 Zhu, Sun (bib0049) 2018; 6 Journal. Citation reports. 2019. Fog (bib0123) 2018 Broumandnia (bib0006) 2019; 47 Pizolato, Romero, Neto (bib0002) 2008; 55 Mirzaei, Yaghoobi, Irani (bib0028) 2011; 67 Elkholy, Hennawy, Elkouny, Zahran (bib0103) 2016 Alawida, Samsudin, Teh, Alkhawaldeh (bib0011) 2019; 160 Li, Chen, Álvarez (bib0068) 2006; 16 Halagali, Desai (bib0066) 2018 Liu, Wang (bib0030) 2010; 59 Hamza (bib0022) 2017; 35 Wang, Pei, Zou, Cheung, He (bib0074) 2006; 360 Kanso, Ghebleh (bib0091) 2013; 18 Ahmed H, Kalash H, Allah O. An efficient chaos-based feedback stream cipher (ecbfsc) for image encryption and decryption. Informatica. Jallouli, Assad, Chetto, Lozi (bib0071) 2017; 77 Daemen, Rijmen (bib0120) 2002 MySEAL (bib0119) 2018 Wang, Tan (bib0081) 2018 Wu, Wang, Wang, Kan, Kurths (bib0061) 2018; 148 Altaf, Ahmad, Khan, Uddin, Yang (bib0067) 2018; 77 Hua, Zhou, Huang (bib0012) 2019; 480 Ding, Liu, Zhang, Ding (bib0007) 2019; 11 CAESAR (bib0117) 2014 Zhu (bib0113) 2015; 85 Flores-Vergara A, García-Guerrero EE, Inzunza-González E, López-Bonilla OR, Rodríguez-Orozco E, Cárdenas-Valdez JR, Tlelo-Cuautle E. Implementing a chaotic cryptosystem in a 64-bit embedded system by using multiple-precision arithmetic. Nonlinear Dyn doi Islam (bib0114) 2015; 312 Li, Wang, Zuo (bib0013) 2019; 115 Sivakumar, Li (bib0014) 2019; 111 Su, Lian, Zhang, Jiang (bib0105) 2011 Chen, Zhu, Zhang, Zhang, Yang (bib0062) 2018; 142 Çavuşoğlu U, Kaçar S. A novel parallel image encryption algorithm based on chaos. Cluster Comput. doi Bose R. Novel public key encryption technique based on multiple chaotic systems. Phys Rev Lett 95(9). doi zrk (10.1016/j.jisa.2019.102421_bib0085) 2015; 80 Huang (10.1016/j.jisa.2019.102421_bib0042) 2019; 115 Hua (10.1016/j.jisa.2019.102421_bib0012) 2019; 480 Daemen (10.1016/j.jisa.2019.102421_bib0120) 2002 Submission (10.1016/j.jisa.2019.102421_bib0118) 2018 Valli (10.1016/j.jisa.2019.102421_bib0104) 2017; 132 Hu (10.1016/j.jisa.2019.102421_bib0024) 2016; 87 Ding (10.1016/j.jisa.2019.102421_bib0007) 2019; 11 Alawida (10.1016/j.jisa.2019.102421_bib0011) 2019; 160 Sharafi (10.1016/j.jisa.2019.102421_bib0116) 2019; 7 Xu (10.1016/j.jisa.2019.102421_bib0115) 2019; 121 Xie (10.1016/j.jisa.2019.102421_bib0112) 2014; 79 Bahrami (10.1016/j.jisa.2019.102421_bib0027) 2012; 2012 Ahmad (10.1016/j.jisa.2019.102421_bib0050) 2014; 12 Li (10.1016/j.jisa.2019.102421_bib0013) 2019; 115 Teh (10.1016/j.jisa.2019.102421_bib0060) 2017; 2017 10.1016/j.jisa.2019.102421_bib0017 10.1016/j.jisa.2019.102421_bib0016 Wang (10.1016/j.jisa.2019.102421_bib0081) 2018 10.1016/j.jisa.2019.102421_bib0019 10.1016/j.jisa.2019.102421_bib0018 Clark (10.1016/j.jisa.2019.102421_bib0088) 1994; 43 10.1016/j.jisa.2019.102421_bib0015 Chain (10.1016/j.jisa.2019.102421_bib0106) 2013; 74 CAESAR (10.1016/j.jisa.2019.102421_sbref0101) 2014 10.1016/j.jisa.2019.102421_bib0096 10.1016/j.jisa.2019.102421_bib0098 Sheludko (10.1016/j.jisa.2019.102421_bib0069) 2018; 51 Zhang (10.1016/j.jisa.2019.102421_bib0101) 2016 Sivakumar (10.1016/j.jisa.2019.102421_bib0014) 2019; 111 Bertoni (10.1016/j.jisa.2019.102421_sbref0084) 2013 Hamza (10.1016/j.jisa.2019.102421_bib0022) 2017; 35 Lu (10.1016/j.jisa.2019.102421_bib0111) 2016; 11 Essaid (10.1016/j.jisa.2019.102421_bib0005) 2019; 47 Alawida (10.1016/j.jisa.2019.102421_bib0045) 2019; 164 Jallouli (10.1016/j.jisa.2019.102421_bib0071) 2017; 77 Liu (10.1016/j.jisa.2019.102421_bib0020) 2018; 97 Elkholy (10.1016/j.jisa.2019.102421_bib0103) 2016 Tenny (10.1016/j.jisa.2019.102421_bib0077) 2005; 52 Bahi (10.1016/j.jisa.2019.102421_bib0089) 2010; 4 MySEAL (10.1016/j.jisa.2019.102421_sbref0103) 2018 Liu (10.1016/j.jisa.2019.102421_bib0030) 2010; 59 Wang (10.1016/j.jisa.2019.102421_bib0051) 2018; 144 Chenaghlu (10.1016/j.jisa.2019.102421_bib0094) 2016; 87 Wu (10.1016/j.jisa.2019.102421_bib0061) 2018; 148 Kanso (10.1016/j.jisa.2019.102421_bib0091) 2013; 18 Kanso (10.1016/j.jisa.2019.102421_bib0090) 2012; 186 Kyrtsou (10.1016/j.jisa.2019.102421_bib0001) 2007; 377 Nesa (10.1016/j.jisa.2019.102421_bib0004) 2019; 47 10.1016/j.jisa.2019.102421_bib0035 10.1016/j.jisa.2019.102421_bib0031 Zhang (10.1016/j.jisa.2019.102421_bib0075) 2008; 37 Wang (10.1016/j.jisa.2019.102421_bib0010) 2019; 115 Vidal (10.1016/j.jisa.2019.102421_bib0070) 2014; 223 Chai (10.1016/j.jisa.2019.102421_bib0023) 2017; 31 Zhu (10.1016/j.jisa.2019.102421_bib0049) 2018; 6 Li (10.1016/j.jisa.2019.102421_bib0055) 2018; 6 Patro (10.1016/j.jisa.2019.102421_bib0039) 2018; 40 Li (10.1016/j.jisa.2019.102421_bib0021) 2018; 94 zkaynak (10.1016/j.jisa.2019.102421_bib0048) 2012; 285 François (10.1016/j.jisa.2019.102421_bib0084) 2014; 19 Pizolato (10.1016/j.jisa.2019.102421_bib0002) 2008; 55 Li (10.1016/j.jisa.2019.102421_bib0052) 2018; 25 Ahmad (10.1016/j.jisa.2019.102421_bib0082) 2018 10.1016/j.jisa.2019.102421_bib0102 Gong (10.1016/j.jisa.2019.102421_bib0110) 2012; 70 Howell (10.1016/j.jisa.2019.102421_bib0033) 1990; 3 Hua (10.1016/j.jisa.2019.102421_bib0038) 2018; 149 Mirzaei (10.1016/j.jisa.2019.102421_bib0028) 2011; 67 Meshram (10.1016/j.jisa.2019.102421_bib0107) 2018; 23 Li (10.1016/j.jisa.2019.102421_bib0068) 2006; 16 10.1016/j.jisa.2019.102421_bib0073 10.1016/j.jisa.2019.102421_bib0072 Luo (10.1016/j.jisa.2019.102421_bib0008) 2019; 161 Artiles (10.1016/j.jisa.2019.102421_bib0040) 2019; 79 Lambić (10.1016/j.jisa.2019.102421_bib0086) 2017; 90 Islam (10.1016/j.jisa.2019.102421_bib0114) 2015; 312 Halagali (10.1016/j.jisa.2019.102421_bib0066) 2018 Li (10.1016/j.jisa.2019.102421_bib0093) 2012; 214 10.1016/j.jisa.2019.102421_bib0056 Li (10.1016/j.jisa.2019.102421_bib0097) 2016; 28 Zhu (10.1016/j.jisa.2019.102421_bib0113) 2015; 85 Shannon (10.1016/j.jisa.2019.102421_bib0036) 1945 Çavuşoğlu (10.1016/j.jisa.2019.102421_bib0080) 2017; 104 Alvarez (10.1016/j.jisa.2019.102421_bib0122) 2011 Broumandnia (10.1016/j.jisa.2019.102421_bib0006) 2019; 47 Long (10.1016/j.jisa.2019.102421_bib0029) 2010 Su (10.1016/j.jisa.2019.102421_bib0105) 2011 Fog (10.1016/j.jisa.2019.102421_bib0123) 2018 Li (10.1016/j.jisa.2019.102421_bib0054) 2018; 25 Altaf (10.1016/j.jisa.2019.102421_bib0067) 2018; 77 Hu (10.1016/j.jisa.2019.102421_bib0064) 2017; 134 Lee (10.1016/j.jisa.2019.102421_bib0059) 2018; 92 Wang (10.1016/j.jisa.2019.102421_bib0074) 2006; 360 Ahmad (10.1016/j.jisa.2019.102421_bib0109) 2018; 5 Luo (10.1016/j.jisa.2019.102421_bib0046) 2019; 78 Bertoni (10.1016/j.jisa.2019.102421_bib0100) 2008 Norouzi (10.1016/j.jisa.2019.102421_bib0025) 2014; 78 Satish (10.1016/j.jisa.2019.102421_bib0032) 2004; 50 10.1016/j.jisa.2019.102421_bib0087 10.1016/j.jisa.2019.102421_bib0092 Kandar (10.1016/j.jisa.2019.102421_bib0041) 2019; 44 Ahmad (10.1016/j.jisa.2019.102421_bib0058) 2018; 34 Li (10.1016/j.jisa.2019.102421_bib0053) 2019; 96 Ye (10.1016/j.jisa.2019.102421_bib0026) 2012; 71 Solís-Sánchez (10.1016/j.jisa.2019.102421_bib0078) 2018; 9 García-Martínez (10.1016/j.jisa.2019.102421_bib0083) 2014; 25 Wang (10.1016/j.jisa.2019.102421_bib0044) 2019; 122 Alzaidi (10.1016/j.jisa.2019.102421_bib0108) 2018; 6 Verma (10.1016/j.jisa.2019.102421_bib0043) 2013; 9 Masuda (10.1016/j.jisa.2019.102421_bib0037) 2006; 53 Chai (10.1016/j.jisa.2019.102421_bib0063) 2019; 155 10.1016/j.jisa.2019.102421_bib0076 Chai (10.1016/j.jisa.2019.102421_bib0003) 2019; 155 Chen (10.1016/j.jisa.2019.102421_bib0062) 2018; 142 Wu (10.1016/j.jisa.2019.102421_bib0065) 2018; 153 Solak (10.1016/j.jisa.2019.102421_bib0047) 2010; 283 Hosseinzadeh (10.1016/j.jisa.2019.102421_bib0009) 2019; 120 Liu (10.1016/j.jisa.2019.102421_bib0079) 2017; 24 Akhavan (10.1016/j.jisa.2019.102421_bib0095) 2013 Alvarez (10.1016/j.jisa.2019.102421_bib0034) 2009; 14 Ahmad (10.1016/j.jisa.2019.102421_bib0057) 2018; 10 Aoki (10.1016/j.jisa.2019.102421_sbref0105) 2001 |
| References_xml | – volume: 47 start-page: 320 year: 2019 end-page: 328 ident: bib0004 article-title: Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map publication-title: J Inf Secur Appl – year: 1945 ident: bib0036 article-title: A mathematical theory of cryptography publication-title: Tech rep, Bell Telephone Labs – volume: 80 start-page: 1147 year: 2015 end-page: 1157 ident: bib0085 article-title: A novel method for producing pseudo random numbers from differential equation-based chaotic systems publication-title: Nonlinear Dyn – volume: 121 start-page: 203 year: 2019 end-page: 214 ident: bib0115 article-title: A fast image encryption algorithm based on compressive sensing and hyperchaotic map publication-title: Opt Lasers Eng – volume: 74 start-page: 1003 year: 2013 end-page: 1012 ident: bib0106 article-title: A new digital signature scheme based on chaotic maps publication-title: Nonlinear Dyn – volume: 90 start-page: 223 year: 2017 end-page: 232 ident: bib0086 article-title: Pseudo-random number generator based on discrete-space chaotic map publication-title: Nonlinear Dyn – volume: 85 start-page: 2141 year: 2015 end-page: 2156 ident: bib0113 article-title: Cryptanalysis and improvement of a mobile dynamic ID authenticated key agreement scheme based on chaotic maps publication-title: Wirel Pers Commun – year: 2014 ident: bib0117 article-title: Competition for authenticated encryption: Security publication-title: Applicab Robustness – volume: 78 start-page: 22023 year: 2019 end-page: 22043 ident: bib0046 article-title: A novel chaotic image encryption algorithm based on improved baker map and logistic map publication-title: Multimed Tools Appl – volume: 122 start-page: 225 year: 2019 end-page: 238 ident: bib0044 article-title: High-sensitivity image encryption algorithm with random diffusion based on dynamic-coupled map lattices publication-title: Opt Lasers Eng – volume: 11 start-page: 853 year: 2019 ident: bib0007 article-title: A new lightweight stream cipher based on chaos publication-title: Symmetry (Basel) – volume: 9 start-page: 271 year: 2013 end-page: 286 ident: bib0043 article-title: Modified multi-chaotic systems that are based on pixel shuffle for image encryption publication-title: J Inf Process Syst – volume: 160 start-page: 45 year: 2019 end-page: 58 ident: bib0011 article-title: A new hybrid digital chaotic system with applications in image encryption publication-title: Signal Process – year: 2018 ident: bib0066 article-title: Implementation of chaos based cryptography in kasumi block cipher publication-title: 2018 International Conference on Communication and Signal Processing (ICCSP) – year: 2013 ident: bib0099 article-title: Keccak, in: Advances in Cryptology EUROCRYPT 2013 – reference: Zhang Y. Test and verification of AES used for image encryption. 3D Research 9(1). doi: – volume: 71 start-page: 259 year: 2012 end-page: 267 ident: bib0026 article-title: An image encryption scheme based on time-delay and hyperchaotic system publication-title: J Nonlinear Dyn – volume: 5 start-page: 131 year: 2018 end-page: 147 ident: bib0109 article-title: Random search based efficient chaotic substitution box design for image encryption publication-title: Int J Rough Sets Data Anal (IJRSDA) – volume: 87 start-page: 216 year: 2016 end-page: 225 ident: bib0094 article-title: A novel keyed parallel hashing scheme based on a new chaotic system publication-title: Chaos Solitons Fractals – volume: 18 start-page: 109 year: 2013 end-page: 123 ident: bib0091 article-title: A fast and efficient chaos-based keyed hash function publication-title: Commun Nonlinear Sci Numer Simul – reference: Alawida M, Samsudin A, Teh JS. Enhancing unimodal digital chaotic maps through hybridisation. Nonlinear Dyn doi: – volume: 79 start-page: 2345 year: 2014 end-page: 2358 ident: bib0112 article-title: Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server’s public key and smart card publication-title: Nonlinear Dyn – reference: Khedr WI. A new efficient and configurable image encryption structure for secure transmission. Multimed Tools Appl. doi: – volume: 6 start-page: 47102 year: 2018 end-page: 47111 ident: bib0055 article-title: Cryptanalyzing a color image encryption scheme based on hybrid hyper-chaotic system and cellular automata publication-title: IEEE Access – volume: 104 start-page: 655 year: 2017 end-page: 667 ident: bib0080 article-title: The design and implementation of hybrid RSA algorithm using a novel chaos based RNG, chaos publication-title: Solitons Fractals – volume: 6 start-page: 55405 year: 2018 end-page: 55418 ident: bib0108 article-title: A new 1d chaotic map and publication-title: IEEE Access – volume: 161 start-page: 227 year: 2019 end-page: 247 ident: bib0008 article-title: A robust image encryption algorithm based on chua’s circuit and compressive sensing publication-title: Signal Process – volume: 44 start-page: 117 year: 2019 end-page: 129 ident: bib0041 article-title: Image encryption using sequence generated by cyclic group publication-title: J Inf Secur Appl – year: 2018 ident: bib0081 article-title: Modified RSA encryption algorithm based on chaos and its application in voice encryption system publication-title: 2018 14th International Conference on Computational Intelligence and Security (CIS) – start-page: 181 year: 2008 end-page: 197 ident: bib0100 article-title: On the indifferentiability of the sponge construction publication-title: Advances in Cryptology EUROCRYPT 2008 – volume: 92 start-page: 575 year: 2018 end-page: 593 ident: bib0059 article-title: SPRING: A novel parallel chaos-based image encryption scheme publication-title: Nonlinear Dyn – volume: 312 start-page: 104 year: 2015 end-page: 130 ident: bib0114 article-title: Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps publication-title: Inf Sci – volume: 11 start-page: e0153870 year: 2016 ident: bib0111 article-title: An extended chaotic maps-based three-party password-authenticated key agreement with user anonymity publication-title: PLOS ONE – volume: 3 start-page: 81 year: 1990 end-page: 83 ident: bib0033 article-title: An introduction to chaotic dynamical systems. 2nd edition, by robert l. devaney publication-title: J Appl Math StochastAnal – volume: 10 start-page: 266 year: 2018 ident: bib0057 article-title: Cryptanalysis of an image encryption algorithm based on combined chaos for a ban system, and improved scheme using sha-512 and hyperchaos publication-title: Symmetry – reference: Xiong Z, Wu Y, Ye C, Zhang X, Xu F. Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl doi: – start-page: 257 year: 2011 end-page: 295 ident: bib0122 article-title: Lessons learnt from the cryptanalysis of chaos-based ciphers publication-title: Studies in Computational Intelligence – volume: 16 start-page: 1557 year: 2006 end-page: 1568 ident: bib0068 article-title: Return-map cryptanalysis revisisted publication-title: Int J Bifurcation Chaos – volume: 28 start-page: 1405 year: 2016 end-page: 1415 ident: bib0097 article-title: A fast and efficient hash function based on generalized chaotic mapping with variable parameters publication-title: Neural Comput Appl – volume: 155 start-page: 44 year: 2019 end-page: 62 ident: bib0003 article-title: A color image cryptosystem based on dynamic DNA encryption and chaos publication-title: Signal Process – year: 2013 ident: bib0095 article-title: A novel parallel hash function based on 3d chaotic map publication-title: EURASIP J Adv Signal Process – volume: 70 start-page: 2401 year: 2012 end-page: 2406 ident: bib0110 article-title: A secure chaotic maps-based key agreement protocol without using smart cards publication-title: Nonlinear Dyn – reference: Lin Z, Guyeux C, Yu S, Wang Q, Cai S. On the use of chaotic iterations to design keyed hash function. Cluster Comput doi: – volume: 94 start-page: 1319 year: 2018 end-page: 1333 ident: bib0021 article-title: A novel plaintext-related image encryption scheme using hyper-chaotic system publication-title: Nonlinear Dyn – volume: 9 start-page: 160 year: 2018 ident: bib0078 article-title: Using the logistic coupled map for public key cryptography under a distributed dynamics encryption scheme publication-title: Information – volume: 285 start-page: 4946 year: 2012 end-page: 4948 ident: bib0048 article-title: Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences publication-title: Opt Commun – volume: 25 start-page: 1350105 year: 2014 ident: bib0083 article-title: Pseudo-random bit generator based on lag time series publication-title: International Journal of Modern Physics C – volume: 53 start-page: 1341 year: 2006 end-page: 1352 ident: bib0037 article-title: Chaotic block ciphers: from theory to practical algorithms publication-title: IEEE Trans Circuits Syst I Regul Pap – volume: 115 start-page: 42 year: 2019 end-page: 57 ident: bib0010 article-title: A new image encryption algorithm with nonlinear-diffusion based on multiple coupled map lattices publication-title: Opt Laser Technol – volume: 59 start-page: 3320 year: 2010 end-page: 3327 ident: bib0030 article-title: Color image encryption based on one-time keys and robust chaotic maps publication-title: Comput Math Appl – year: 2016 ident: bib0101 article-title: Image watermarking scheme based on arnold transform and DWT-DCT-SVD publication-title: 2016 IEEE 13th International Conference on Signal Processing (ICSP) – year: 2010 ident: bib0029 article-title: A chaos-based data encryption algorithm for image/video publication-title: 2010 Second International Conference on Multimedia and Information Technology – volume: 35 start-page: 119 year: 2017 end-page: 127 ident: bib0022 article-title: A novel pseudo random sequence generator for image-cryptographic applications publication-title: J Inf Secur Appl – reference: Ahmed H, Kalash H, Allah O. An efficient chaos-based feedback stream cipher (ecbfsc) for image encryption and decryption. Informatica. – volume: 2017 start-page: 1 year: 2017 end-page: 15 ident: bib0060 article-title: A chaos-based authenticated cipher with associated data publication-title: Secur Commun Netw – year: 2001 ident: bib0121 article-title: Camellia: A 128-bit block cipher suitable for multiple platforms design andAnalysis publication-title: Selected Areas in Cryptography – reference: Ahmad M, Singh S, Khurana S. Cryptographic one-way hash function generation using twelve-terms 4d nonlinear system. Int J Inf Technol doi: – reference: Ahmad M, Khurana S, Singh S, AlSharari HD. A simple secure hash function scheme using multiple chaotic maps. 3D Research 8(2). doi: – volume: 96 start-page: 31 year: 2019 end-page: 47 ident: bib0053 article-title: Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion publication-title: Nonlinear Dyn – volume: 79 start-page: 24 year: 2019 end-page: 31 ident: bib0040 article-title: Image encryption using block cipher and chaotic sequences publication-title: Signal Process Image Commun – volume: 25 start-page: 46 year: 2018 end-page: 56 ident: bib0052 publication-title: IEEE MultiMedia – volume: 6 start-page: 18759 year: 2018 end-page: 18770 ident: bib0049 article-title: Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced chaotic tent maps publication-title: IEEE Access – year: 2016 ident: bib0103 article-title: Using hyper chaos in secure video transmission publication-title: 2016 28th International Conference on Microelectronics (ICM) – volume: 51 start-page: 337 year: 2018 end-page: 342 ident: bib0069 article-title: Parameter estimation for one-dimensional chaotic systems by guaranteed algorithm and particle swarm optimization publication-title: IFAC-PapersOnLine – volume: 12 start-page: 113 year: 2014 end-page: 128 ident: bib0050 article-title: Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys publication-title: Int J Commun NetwDistrib Syst – volume: 7 start-page: 8737 year: 2019 end-page: 8753 ident: bib0116 article-title: A low power cryptography solution based on chaos theory in wireless sensor nodes publication-title: IEEE Access – volume: 78 start-page: 995 year: 2014 end-page: 1015 ident: bib0025 article-title: A fast color image encryption algorithm based on hyper-chaotic systems publication-title: Nonlinear Dyn – volume: 4 start-page: 167 year: 2010 end-page: 181 ident: bib0089 article-title: Hash functions using chaotic iterations publication-title: J Alg Comput Technol – start-page: 205 year: 2011 end-page: 226 ident: bib0105 article-title: Chaos-based video encryption algorithms publication-title: Studies in Computational Intelligence – volume: 34 start-page: 1323 year: 2018 end-page: 1332 ident: bib0058 article-title: Cryptanalysis of an image encryption algorithm based on pwlcm and inertial delayed neural network publication-title: J Intell Fuzzy Syst – volume: 360 start-page: 259 year: 2006 end-page: 262 ident: bib0074 article-title: Security of public key encryption technique based on multiple chaotic systems publication-title: Phys Lett A – volume: 155 start-page: 44 year: 2019 end-page: 62 ident: bib0063 article-title: A color image cryptosystem based on dynamic dna encryption and chaos publication-title: Signal Process – volume: 148 start-page: 272 year: 2018 end-page: 287 ident: bib0061 article-title: Color image dna encryption using nca map-based cml and one-time keys publication-title: Signal Process – volume: 24 start-page: 4797 year: 2017 end-page: 4824 ident: bib0079 article-title: Fractional two-dimensional discrete chaotic map and its applications to the information security with elliptic-curve public key cryptography publication-title: J Vib Control – volume: 55 start-page: 1108 year: 2008 end-page: 1115 ident: bib0002 article-title: Chaotic communication based on the particle-in-a-box electronic circuit publication-title: IEEE Trans Circuits Syst I: Regular Papers – volume: 132 year: 2017 ident: bib0104 article-title: Chaos based video encryption using maps and ikeda time delay system publication-title: Eur Phys J Plus – volume: 134 start-page: 234 year: 2017 end-page: 243 ident: bib0064 article-title: Chaotic image cryptosystem using dna deletion and dna insertion publication-title: Signal Process – volume: 2012 start-page: 1 year: 2012 end-page: 8 ident: bib0027 article-title: Image encryption using a lightweight stream encryption algorithm publication-title: Adv Multimed – volume: 223 start-page: 1601 year: 2014 end-page: 1610 ident: bib0070 article-title: A fast and light stream cipher for smartphones publication-title: Eur Phys J Special Top – reference: Yu W, Liu Y, Gong L, Tian M, Tu L. Double-image encryption based on spatiotemporal chaos and DNA operations. Multimed Tools Appl. doi: – volume: 214 start-page: 56 year: 2012 end-page: 75 ident: bib0093 article-title: Keyed hash function based on a dynamic lookup table of functions publication-title: Inf Sci – year: 2018 ident: bib0118 article-title: Requirements and evaluation criteria for the lightweight cryptography standardization process publication-title: Tech Rep, National Institute of Standards and Technology (NIST) – year: 2018 ident: bib0123 article-title: List of instruction latencies, throughputs and micro-operation breakdowns for Intel, AMD and VIA CPUs publication-title: Tech rep, Technical University of Denmark – volume: 14 start-page: 3743 year: 2009 end-page: 3749 ident: bib0034 article-title: Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption publication-title: Commun Nonlinear Sci Numer Simul – volume: 31 start-page: 219 year: 2017 end-page: 237 ident: bib0023 article-title: A novel image encryption scheme based on DNA sequence operations and chaotic systems publication-title: Neural Comput Appl – volume: 77 start-page: 27981 year: 2018 end-page: 27995 ident: bib0067 article-title: Computationally efficient selective video encryption with chaos based block cipher publication-title: Multimed Tools Appl – year: 2002 ident: bib0120 article-title: The design of rijndael – reference: Journal. Citation reports. 2019. – volume: 115 start-page: 7 year: 2019 end-page: 20 ident: bib0042 article-title: On symmetric color image encryption system with permutation-diffusion simultaneous operation publication-title: Opt Lasers Eng – volume: 164 start-page: 249 year: 2019 end-page: 266 ident: bib0045 article-title: An image encryption scheme based on hybridizing digital chaos and finite state machine publication-title: Signal Process – reference: Ahmad M, Doja M, Beg MS. Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. J King Saud Univ-ComputInf Sci. – volume: 77 start-page: 13391 year: 2017 end-page: 13417 ident: bib0071 article-title: Design and analysis of two stream ciphers based on chaotic coupling and multiplexing techniques publication-title: Multimed Tools Appl – volume: 47 start-page: 173 year: 2019 end-page: 187 ident: bib0005 article-title: Image encryption scheme based on a new secure variant of hill cipher and 1d chaotic maps publication-title: J Inf Secur Appl – volume: 43 start-page: 560 year: 1994 end-page: 568 ident: bib0088 article-title: Maximal and near-maximal shift register sequences: efficient event counters and easy discrete logarithms publication-title: IEEE Trans Comput – volume: 97 start-page: 95 year: 2018 end-page: 105 ident: bib0020 article-title: Secure and robust digital image watermarking scheme using logistic and RSA encryption publication-title: Expert Syst Appl – volume: 283 start-page: 232 year: 2010 end-page: 236 ident: bib0047 article-title: Cryptanalysis of a multi-chaotic systems based image cryptosystem publication-title: Opt Commun – year: 2018 ident: bib0119 article-title: Project: Submission and evaluation criteria version 2.0 [2018] publication-title: Tech rep, CyberSecurity Malaysia – volume: 25 start-page: 92 year: 2018 end-page: 101 ident: bib0054 article-title: Cryptanalysis and improvement of a chaotic image encryption by first-order time-delay system publication-title: IEEE MultiMedia – volume: 52 start-page: 672 year: 2005 end-page: 679 ident: bib0077 article-title: Additive mixing modulation for public key encryption based on distributed dynamics publication-title: IEEE Trans Circuits Syst I: Regular Papers – volume: 149 start-page: 148 year: 2018 end-page: 161 ident: bib0038 article-title: 2D logistic-sine-coupling map for image encryption publication-title: Signal Process – reference: Bose R. Novel public key encryption technique based on multiple chaotic systems. Phys Rev Lett 95(9). doi: – reference: Tenny R, Tsimring LS, Larson L, Abarbanel HDI. Using distributed nonlinear dynamics for public key encryption. Phys Rev Lett 90(4). doi: – volume: 50 start-page: 587 year: 2004 end-page: 590 ident: bib0032 article-title: Chaos based spread spectrum image steganography publication-title: IEEE Trans Consumer Electron – reference: Flores-Vergara A, García-Guerrero EE, Inzunza-González E, López-Bonilla OR, Rodríguez-Orozco E, Cárdenas-Valdez JR, Tlelo-Cuautle E. Implementing a chaotic cryptosystem in a 64-bit embedded system by using multiple-precision arithmetic. Nonlinear Dyn doi: – volume: 186 start-page: 249 year: 2012 end-page: 264 ident: bib0090 article-title: Keyed hash function based on a chaotic map publication-title: Inf Sci – volume: 153 start-page: 11 year: 2018 end-page: 23 ident: bib0065 article-title: Image encryption using 2d hénon-sine map and dna approach publication-title: Signal Process – volume: 37 start-page: 669 year: 2008 end-page: 674 ident: bib0075 article-title: Cryptanalysis of the public key encryption based on multiple chaotic systems publication-title: Chaos Solitons Fractals – volume: 87 start-page: 51 year: 2016 end-page: 66 ident: bib0024 article-title: An image encryption scheme combining chaos with cycle operation for DNA sequences publication-title: Nonlinear Dyn – volume: 120 start-page: 105698 year: 2019 ident: bib0009 article-title: Hybrid image encryption algorithm based on 3d chaotic system and choquet fuzzy integral publication-title: Opt Laser Technol – reference: Çavuşoğlu U, Kaçar S. A novel parallel image encryption algorithm based on chaos. Cluster Comput. doi: – volume: 115 start-page: 197 year: 2019 end-page: 207 ident: bib0013 article-title: Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms publication-title: Opt Lasers Eng – reference: Soleymani S.H., Taherinia A.H., Mohajerzadeh A.H.. WACA: A new blind robust watermarking method based on arnold cat map and amplified pseudo-noise strings with weak correlation. Multimed Tools Appl doi: – volume: 23 start-page: 747 year: 2018 end-page: 753 ident: bib0107 article-title: An efficient online/offline ID-based short signature procedure using extended chaotic maps publication-title: Soft Comput – reference: . – volume: 67 start-page: 557 year: 2011 end-page: 566 ident: bib0028 article-title: A new image encryption method: parallel sub-image encryption with hyper chaos publication-title: Nonlinear Dyn – volume: 144 start-page: 444 year: 2018 end-page: 452 ident: bib0051 article-title: Cryptanalysis and enhancements of image encryption using combination of the 1d chaotic map publication-title: Signal Process – start-page: 543 year: 2018 end-page: 553 ident: bib0082 article-title: A new chaotic map based secure and efficient pseudo-random bit sequence generation publication-title: International Symposium on Security in Computing and Communication – volume: 377 start-page: 227 year: 2007 end-page: 229 ident: bib0001 article-title: Detecting positive feedback in multivariate time series: the case of metal prices and US inflation publication-title: Physica A – volume: 142 start-page: 340 year: 2018 end-page: 353 ident: bib0062 article-title: Exploiting self-adaptive permutation–diffusion and dna random encoding for secure and efficient image encryption publication-title: Signal Process – volume: 19 start-page: 887 year: 2014 end-page: 895 ident: bib0084 article-title: Pseudo-random number generator based on mixing of three chaotic maps publication-title: Commun Nonlinear Sci Numer Simul – volume: 480 start-page: 403 year: 2019 end-page: 419 ident: bib0012 article-title: Cosine-transform-based chaotic system for image encryption publication-title: Inf Sci – volume: 40 start-page: 111 year: 2018 end-page: 133 ident: bib0039 article-title: Secure multi-level permutation operation based multiple colour image encryption publication-title: J Inf Secur Appl – volume: 111 start-page: 196 year: 2019 end-page: 204 ident: bib0014 article-title: A secure image encryption method using scan pattern and random key stream derived from laser chaos publication-title: Opt Laser Technol – volume: 47 start-page: 188 year: 2019 end-page: 198 ident: bib0006 article-title: Designing digital image encryption using 2d and 3d reversible modular chaotic maps publication-title: J Inf Secur Appl – volume: 28 start-page: 1405 issue: 6 year: 2016 ident: 10.1016/j.jisa.2019.102421_bib0097 article-title: A fast and efficient hash function based on generalized chaotic mapping with variable parameters publication-title: Neural Comput Appl doi: 10.1007/s00521-015-2158-7 – year: 2001 ident: 10.1016/j.jisa.2019.102421_sbref0105 article-title: Camellia: A 128-bit block cipher suitable for multiple platforms design andAnalysis – start-page: 257 year: 2011 ident: 10.1016/j.jisa.2019.102421_bib0122 article-title: Lessons learnt from the cryptanalysis of chaos-based ciphers doi: 10.1007/978-3-642-20542-2_8 – volume: 360 start-page: 259 issue: 2 year: 2006 ident: 10.1016/j.jisa.2019.102421_bib0074 article-title: Security of public key encryption technique based on multiple chaotic systems publication-title: Phys Lett A doi: 10.1016/j.physleta.2006.05.038 – volume: 67 start-page: 557 issue: 1 year: 2011 ident: 10.1016/j.jisa.2019.102421_bib0028 article-title: A new image encryption method: parallel sub-image encryption with hyper chaos publication-title: Nonlinear Dyn doi: 10.1007/s11071-011-0006-6 – volume: 79 start-page: 24 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0040 article-title: Image encryption using block cipher and chaotic sequences publication-title: Signal Process Image Commun doi: 10.1016/j.image.2019.08.014 – volume: 44 start-page: 117 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0041 article-title: Image encryption using sequence generated by cyclic group publication-title: J Inf Secur Appl – ident: 10.1016/j.jisa.2019.102421_bib0016 doi: 10.1007/s10586-018-02895-w – volume: 43 start-page: 560 issue: 5 year: 1994 ident: 10.1016/j.jisa.2019.102421_bib0088 article-title: Maximal and near-maximal shift register sequences: efficient event counters and easy discrete logarithms publication-title: IEEE Trans Comput doi: 10.1109/12.280803 – volume: 94 start-page: 1319 issue: 2 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0021 article-title: A novel plaintext-related image encryption scheme using hyper-chaotic system publication-title: Nonlinear Dyn doi: 10.1007/s11071-018-4426-4 – volume: 115 start-page: 7 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0042 article-title: On symmetric color image encryption system with permutation-diffusion simultaneous operation publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2018.11.015 – volume: 9 start-page: 271 issue: 2 year: 2013 ident: 10.1016/j.jisa.2019.102421_bib0043 article-title: Modified multi-chaotic systems that are based on pixel shuffle for image encryption publication-title: J Inf Process Syst doi: 10.3745/JIPS.2013.9.2.271 – ident: 10.1016/j.jisa.2019.102421_bib0031 – volume: 37 start-page: 669 issue: 3 year: 2008 ident: 10.1016/j.jisa.2019.102421_bib0075 article-title: Cryptanalysis of the public key encryption based on multiple chaotic systems publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2006.09.047 – start-page: 205 year: 2011 ident: 10.1016/j.jisa.2019.102421_bib0105 article-title: Chaos-based video encryption algorithms doi: 10.1007/978-3-642-20542-2_6 – year: 2018 ident: 10.1016/j.jisa.2019.102421_sbref0103 article-title: Project: Submission and evaluation criteria version 2.0 [2018] publication-title: Tech rep, CyberSecurity Malaysia – ident: 10.1016/j.jisa.2019.102421_bib0072 doi: 10.1007/s11071-019-04802-3 – volume: 47 start-page: 320 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0004 article-title: Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map publication-title: J Inf Secur Appl – volume: 3 start-page: 81 issue: 1 year: 1990 ident: 10.1016/j.jisa.2019.102421_bib0033 article-title: An introduction to chaotic dynamical systems. 2nd edition, by robert l. devaney publication-title: J Appl Math StochastAnal – volume: 7 start-page: 8737 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0116 article-title: A low power cryptography solution based on chaos theory in wireless sensor nodes publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2886384 – volume: 92 start-page: 575 issue: 2 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0059 article-title: SPRING: A novel parallel chaos-based image encryption scheme publication-title: Nonlinear Dyn doi: 10.1007/s11071-018-4076-6 – volume: 35 start-page: 119 year: 2017 ident: 10.1016/j.jisa.2019.102421_bib0022 article-title: A novel pseudo random sequence generator for image-cryptographic applications publication-title: J Inf Secur Appl – volume: 78 start-page: 995 issue: 2 year: 2014 ident: 10.1016/j.jisa.2019.102421_bib0025 article-title: A fast color image encryption algorithm based on hyper-chaotic systems publication-title: Nonlinear Dyn doi: 10.1007/s11071-014-1492-0 – volume: 10 start-page: 266 issue: 7 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0057 article-title: Cryptanalysis of an image encryption algorithm based on combined chaos for a ban system, and improved scheme using sha-512 and hyperchaos publication-title: Symmetry doi: 10.3390/sym10070266 – volume: 52 start-page: 672 issue: 3 year: 2005 ident: 10.1016/j.jisa.2019.102421_bib0077 article-title: Additive mixing modulation for public key encryption based on distributed dynamics publication-title: IEEE Trans Circuits Syst I: Regular Papers doi: 10.1109/TCSI.2004.842870 – volume: 87 start-page: 216 year: 2016 ident: 10.1016/j.jisa.2019.102421_bib0094 article-title: A novel keyed parallel hashing scheme based on a new chaotic system publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2016.04.007 – volume: 283 start-page: 232 issue: 2 year: 2010 ident: 10.1016/j.jisa.2019.102421_bib0047 article-title: Cryptanalysis of a multi-chaotic systems based image cryptosystem publication-title: Opt Commun doi: 10.1016/j.optcom.2009.09.070 – volume: 2017 start-page: 1 year: 2017 ident: 10.1016/j.jisa.2019.102421_bib0060 article-title: A chaos-based authenticated cipher with associated data publication-title: Secur Commun Netw doi: 10.1155/2017/9040518 – year: 2013 ident: 10.1016/j.jisa.2019.102421_sbref0084 – volume: 6 start-page: 47102 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0055 article-title: Cryptanalyzing a color image encryption scheme based on hybrid hyper-chaotic system and cellular automata publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2867111 – start-page: 181 year: 2008 ident: 10.1016/j.jisa.2019.102421_bib0100 article-title: On the indifferentiability of the sponge construction – ident: 10.1016/j.jisa.2019.102421_bib0096 doi: 10.1007/s13319-017-0123-1 – start-page: 543 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0082 article-title: A new chaotic map based secure and efficient pseudo-random bit sequence generation – volume: 78 start-page: 22023 issue: 15 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0046 article-title: A novel chaotic image encryption algorithm based on improved baker map and logistic map publication-title: Multimed Tools Appl doi: 10.1007/s11042-019-7453-3 – volume: 24 start-page: 4797 issue: 20 year: 2017 ident: 10.1016/j.jisa.2019.102421_bib0079 article-title: Fractional two-dimensional discrete chaotic map and its applications to the information security with elliptic-curve public key cryptography publication-title: J Vib Control doi: 10.1177/1077546317734712 – ident: 10.1016/j.jisa.2019.102421_bib0056 – volume: 5 start-page: 131 issue: 2 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0109 article-title: Random search based efficient chaotic substitution box design for image encryption publication-title: Int J Rough Sets Data Anal (IJRSDA) doi: 10.4018/IJRSDA.2018040107 – volume: 96 start-page: 31 issue: 1 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0053 article-title: Cryptanalysis and improvement in a chaotic image cipher using two-round permutation and diffusion publication-title: Nonlinear Dyn doi: 10.1007/s11071-019-04771-7 – volume: 153 start-page: 11 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0065 article-title: Image encryption using 2d hénon-sine map and dna approach publication-title: Signal Process doi: 10.1016/j.sigpro.2018.06.008 – volume: 25 start-page: 1350105 issue: 04 year: 2014 ident: 10.1016/j.jisa.2019.102421_bib0083 article-title: Pseudo-random bit generator based on lag time series publication-title: International Journal of Modern Physics C doi: 10.1142/S0129183113501052 – volume: 121 start-page: 203 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0115 article-title: A fast image encryption algorithm based on compressive sensing and hyperchaotic map publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2019.04.011 – ident: 10.1016/j.jisa.2019.102421_bib0019 doi: 10.1007/s13319-017-0154-7 – volume: 122 start-page: 225 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0044 article-title: High-sensitivity image encryption algorithm with random diffusion based on dynamic-coupled map lattices publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2019.04.005 – year: 2014 ident: 10.1016/j.jisa.2019.102421_sbref0101 article-title: Competition for authenticated encryption: Security publication-title: Applicab Robustness – year: 2016 ident: 10.1016/j.jisa.2019.102421_bib0103 article-title: Using hyper chaos in secure video transmission – volume: 23 start-page: 747 issue: 3 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0107 article-title: An efficient online/offline ID-based short signature procedure using extended chaotic maps publication-title: Soft Comput doi: 10.1007/s00500-018-3112-2 – volume: 480 start-page: 403 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0012 article-title: Cosine-transform-based chaotic system for image encryption publication-title: Inf Sci doi: 10.1016/j.ins.2018.12.048 – volume: 79 start-page: 2345 issue: 4 year: 2014 ident: 10.1016/j.jisa.2019.102421_bib0112 article-title: Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server’s public key and smart card publication-title: Nonlinear Dyn doi: 10.1007/s11071-014-1816-0 – volume: 70 start-page: 2401 issue: 4 year: 2012 ident: 10.1016/j.jisa.2019.102421_bib0110 article-title: A secure chaotic maps-based key agreement protocol without using smart cards publication-title: Nonlinear Dyn doi: 10.1007/s11071-012-0628-3 – volume: 11 start-page: 853 issue: 7 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0007 article-title: A new lightweight stream cipher based on chaos publication-title: Symmetry (Basel) doi: 10.3390/sym11070853 – volume: 120 start-page: 105698 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0009 article-title: Hybrid image encryption algorithm based on 3d chaotic system and choquet fuzzy integral publication-title: Opt Laser Technol doi: 10.1016/j.optlastec.2019.105698 – volume: 155 start-page: 44 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0003 article-title: A color image cryptosystem based on dynamic DNA encryption and chaos publication-title: Signal Process doi: 10.1016/j.sigpro.2018.09.029 – volume: 186 start-page: 249 issue: 1 year: 2012 ident: 10.1016/j.jisa.2019.102421_bib0090 article-title: Keyed hash function based on a chaotic map publication-title: Inf Sci doi: 10.1016/j.ins.2011.09.008 – volume: 77 start-page: 27981 issue: 21 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0067 article-title: Computationally efficient selective video encryption with chaos based block cipher publication-title: Multimed Tools Appl doi: 10.1007/s11042-018-6022-5 – volume: 9 start-page: 160 issue: 7 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0078 article-title: Using the logistic coupled map for public key cryptography under a distributed dynamics encryption scheme publication-title: Information doi: 10.3390/info9070160 – ident: 10.1016/j.jisa.2019.102421_bib0092 doi: 10.1007/s41870-018-0199-8 – volume: 148 start-page: 272 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0061 article-title: Color image dna encryption using nca map-based cml and one-time keys publication-title: Signal Process doi: 10.1016/j.sigpro.2018.02.028 – ident: 10.1016/j.jisa.2019.102421_bib0018 doi: 10.1007/s11042-019-7235-y – volume: 51 start-page: 337 issue: 32 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0069 article-title: Parameter estimation for one-dimensional chaotic systems by guaranteed algorithm and particle swarm optimization publication-title: IFAC-PapersOnLine doi: 10.1016/j.ifacol.2018.11.406 – volume: 16 start-page: 1557 issue: 5 year: 2006 ident: 10.1016/j.jisa.2019.102421_bib0068 article-title: Return-map cryptanalysis revisisted publication-title: Int J Bifurcation Chaos doi: 10.1142/S0218127406015507 – volume: 34 start-page: 1323 issue: 3 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0058 article-title: Cryptanalysis of an image encryption algorithm based on pwlcm and inertial delayed neural network publication-title: J Intell Fuzzy Syst – volume: 80 start-page: 1147 issue: 3 year: 2015 ident: 10.1016/j.jisa.2019.102421_bib0085 article-title: A novel method for producing pseudo random numbers from differential equation-based chaotic systems publication-title: Nonlinear Dyn doi: 10.1007/s11071-015-1932-5 – volume: 285 start-page: 4946 issue: 24 year: 2012 ident: 10.1016/j.jisa.2019.102421_bib0048 article-title: Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences publication-title: Opt Commun doi: 10.1016/j.optcom.2012.07.106 – volume: 164 start-page: 249 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0045 article-title: An image encryption scheme based on hybridizing digital chaos and finite state machine publication-title: Signal Process doi: 10.1016/j.sigpro.2019.06.013 – volume: 74 start-page: 1003 issue: 4 year: 2013 ident: 10.1016/j.jisa.2019.102421_bib0106 article-title: A new digital signature scheme based on chaotic maps publication-title: Nonlinear Dyn doi: 10.1007/s11071-013-1018-1 – ident: 10.1016/j.jisa.2019.102421_bib0073 doi: 10.1103/PhysRevLett.95.098702 – volume: 4 start-page: 167 issue: 2 year: 2010 ident: 10.1016/j.jisa.2019.102421_bib0089 article-title: Hash functions using chaotic iterations publication-title: J Alg Comput Technol doi: 10.1260/1748-3018.4.2.167 – volume: 87 start-page: 51 issue: 1 year: 2016 ident: 10.1016/j.jisa.2019.102421_bib0024 article-title: An image encryption scheme combining chaos with cycle operation for DNA sequences publication-title: Nonlinear Dyn doi: 10.1007/s11071-016-3024-6 – ident: 10.1016/j.jisa.2019.102421_bib0035 – ident: 10.1016/j.jisa.2019.102421_bib0102 doi: 10.1007/s11042-019-7282-4 – year: 2002 ident: 10.1016/j.jisa.2019.102421_bib0120 – volume: 149 start-page: 148 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0038 article-title: 2D logistic-sine-coupling map for image encryption publication-title: Signal Process doi: 10.1016/j.sigpro.2018.03.010 – volume: 47 start-page: 188 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0006 article-title: Designing digital image encryption using 2d and 3d reversible modular chaotic maps publication-title: J Inf Secur Appl – volume: 85 start-page: 2141 issue: 4 year: 2015 ident: 10.1016/j.jisa.2019.102421_bib0113 article-title: Cryptanalysis and improvement of a mobile dynamic ID authenticated key agreement scheme based on chaotic maps publication-title: Wirel Pers Commun doi: 10.1007/s11277-015-2896-y – volume: 312 start-page: 104 year: 2015 ident: 10.1016/j.jisa.2019.102421_bib0114 article-title: Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps publication-title: Inf Sci doi: 10.1016/j.ins.2015.03.050 – year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0066 article-title: Implementation of chaos based cryptography in kasumi block cipher – volume: 6 start-page: 18759 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0049 article-title: Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced chaotic tent maps publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2817600 – volume: 25 start-page: 92 issue: 3 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0054 article-title: Cryptanalysis and improvement of a chaotic image encryption by first-order time-delay system publication-title: IEEE MultiMedia doi: 10.1109/MMUL.2018.112142439 – volume: 53 start-page: 1341 issue: 6 year: 2006 ident: 10.1016/j.jisa.2019.102421_bib0037 article-title: Chaotic block ciphers: from theory to practical algorithms publication-title: IEEE Trans Circuits Syst I Regul Pap doi: 10.1109/TCSI.2006.874182 – volume: 115 start-page: 42 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0010 article-title: A new image encryption algorithm with nonlinear-diffusion based on multiple coupled map lattices publication-title: Opt Laser Technol doi: 10.1016/j.optlastec.2019.02.009 – ident: 10.1016/j.jisa.2019.102421_bib0098 doi: 10.1007/s10586-017-1062-6 – year: 2016 ident: 10.1016/j.jisa.2019.102421_bib0101 article-title: Image watermarking scheme based on arnold transform and DWT-DCT-SVD – year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0123 article-title: List of instruction latencies, throughputs and micro-operation breakdowns for Intel, AMD and VIA CPUs publication-title: Tech rep, Technical University of Denmark – volume: 2012 start-page: 1 year: 2012 ident: 10.1016/j.jisa.2019.102421_bib0027 article-title: Image encryption using a lightweight stream encryption algorithm publication-title: Adv Multimed doi: 10.1155/2012/767364 – volume: 47 start-page: 173 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0005 article-title: Image encryption scheme based on a new secure variant of hill cipher and 1d chaotic maps publication-title: J Inf Secur Appl – volume: 55 start-page: 1108 issue: 4 year: 2008 ident: 10.1016/j.jisa.2019.102421_bib0002 article-title: Chaotic communication based on the particle-in-a-box electronic circuit publication-title: IEEE Trans Circuits Syst I: Regular Papers – volume: 223 start-page: 1601 issue: 8 year: 2014 ident: 10.1016/j.jisa.2019.102421_bib0070 article-title: A fast and light stream cipher for smartphones publication-title: Eur Phys J Special Top doi: 10.1140/epjst/e2014-02185-y – volume: 90 start-page: 223 issue: 1 year: 2017 ident: 10.1016/j.jisa.2019.102421_bib0086 article-title: Pseudo-random number generator based on discrete-space chaotic map publication-title: Nonlinear Dyn doi: 10.1007/s11071-017-3656-1 – volume: 40 start-page: 111 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0039 article-title: Secure multi-level permutation operation based multiple colour image encryption publication-title: J Inf Secur Appl – volume: 115 start-page: 197 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0013 article-title: Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms publication-title: Opt Lasers Eng doi: 10.1016/j.optlaseng.2018.12.002 – volume: 19 start-page: 887 issue: 4 year: 2014 ident: 10.1016/j.jisa.2019.102421_bib0084 article-title: Pseudo-random number generator based on mixing of three chaotic maps publication-title: Commun Nonlinear Sci Numer Simul doi: 10.1016/j.cnsns.2013.08.032 – volume: 25 start-page: 46 issue: 4 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0052 publication-title: IEEE MultiMedia doi: 10.1109/MMUL.2018.2873472 – ident: 10.1016/j.jisa.2019.102421_bib0015 doi: 10.1007/s11042-018-7081-3 – year: 2010 ident: 10.1016/j.jisa.2019.102421_bib0029 article-title: A chaos-based data encryption algorithm for image/video – volume: 71 start-page: 259 issue: 1–2 year: 2012 ident: 10.1016/j.jisa.2019.102421_bib0026 article-title: An image encryption scheme based on time-delay and hyperchaotic system publication-title: J Nonlinear Dyn – volume: 31 start-page: 219 issue: 1 year: 2017 ident: 10.1016/j.jisa.2019.102421_bib0023 article-title: A novel image encryption scheme based on DNA sequence operations and chaotic systems publication-title: Neural Comput Appl doi: 10.1007/s00521-017-2993-9 – year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0118 article-title: Requirements and evaluation criteria for the lightweight cryptography standardization process publication-title: Tech Rep, National Institute of Standards and Technology (NIST) – volume: 377 start-page: 227 issue: 1 year: 2007 ident: 10.1016/j.jisa.2019.102421_bib0001 article-title: Detecting positive feedback in multivariate time series: the case of metal prices and US inflation publication-title: Physica A doi: 10.1016/j.physa.2006.11.002 – volume: 14 start-page: 3743 issue: 11 year: 2009 ident: 10.1016/j.jisa.2019.102421_bib0034 article-title: Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption publication-title: Commun Nonlinear Sci Numer Simul doi: 10.1016/j.cnsns.2009.02.033 – volume: 97 start-page: 95 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0020 article-title: Secure and robust digital image watermarking scheme using logistic and RSA encryption publication-title: Expert Syst Appl doi: 10.1016/j.eswa.2017.12.003 – volume: 144 start-page: 444 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0051 article-title: Cryptanalysis and enhancements of image encryption using combination of the 1d chaotic map publication-title: Signal Process doi: 10.1016/j.sigpro.2017.11.005 – volume: 161 start-page: 227 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0008 article-title: A robust image encryption algorithm based on chua’s circuit and compressive sensing publication-title: Signal Process doi: 10.1016/j.sigpro.2019.03.022 – volume: 59 start-page: 3320 issue: 10 year: 2010 ident: 10.1016/j.jisa.2019.102421_bib0030 article-title: Color image encryption based on one-time keys and robust chaotic maps publication-title: Comput Math Appl doi: 10.1016/j.camwa.2010.03.017 – volume: 160 start-page: 45 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0011 article-title: A new hybrid digital chaotic system with applications in image encryption publication-title: Signal Process doi: 10.1016/j.sigpro.2019.02.016 – volume: 134 start-page: 234 year: 2017 ident: 10.1016/j.jisa.2019.102421_bib0064 article-title: Chaotic image cryptosystem using dna deletion and dna insertion publication-title: Signal Process doi: 10.1016/j.sigpro.2016.12.008 – volume: 12 start-page: 113 issue: 1 year: 2014 ident: 10.1016/j.jisa.2019.102421_bib0050 article-title: Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys publication-title: Int J Commun NetwDistrib Syst – volume: 50 start-page: 587 issue: 2 year: 2004 ident: 10.1016/j.jisa.2019.102421_bib0032 article-title: Chaos based spread spectrum image steganography publication-title: IEEE Trans Consumer Electron doi: 10.1109/TCE.2004.1309431 – issue: 1 year: 2013 ident: 10.1016/j.jisa.2019.102421_bib0095 article-title: A novel parallel hash function based on 3d chaotic map publication-title: EURASIP J Adv Signal Process doi: 10.1186/1687-6180-2013-126 – volume: 77 start-page: 13391 issue: 11 year: 2017 ident: 10.1016/j.jisa.2019.102421_bib0071 article-title: Design and analysis of two stream ciphers based on chaotic coupling and multiplexing techniques publication-title: Multimed Tools Appl doi: 10.1007/s11042-017-4953-x – volume: 132 issue: 12 year: 2017 ident: 10.1016/j.jisa.2019.102421_bib0104 article-title: Chaos based video encryption using maps and ikeda time delay system publication-title: Eur Phys J Plus doi: 10.1140/epjp/i2017-11819-7 – year: 1945 ident: 10.1016/j.jisa.2019.102421_bib0036 article-title: A mathematical theory of cryptography publication-title: Tech rep, Bell Telephone Labs – ident: 10.1016/j.jisa.2019.102421_bib0076 doi: 10.1103/PhysRevLett.90.047903 – volume: 142 start-page: 340 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0062 article-title: Exploiting self-adaptive permutation–diffusion and dna random encoding for secure and efficient image encryption publication-title: Signal Process doi: 10.1016/j.sigpro.2017.07.034 – volume: 104 start-page: 655 year: 2017 ident: 10.1016/j.jisa.2019.102421_bib0080 article-title: The design and implementation of hybrid RSA algorithm using a novel chaos based RNG, chaos publication-title: Solitons Fractals doi: 10.1016/j.chaos.2017.09.025 – volume: 214 start-page: 56 year: 2012 ident: 10.1016/j.jisa.2019.102421_bib0093 article-title: Keyed hash function based on a dynamic lookup table of functions publication-title: Inf Sci doi: 10.1016/j.ins.2012.06.001 – ident: 10.1016/j.jisa.2019.102421_bib0017 doi: 10.1007/s11042-018-7110-2 – volume: 155 start-page: 44 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0063 article-title: A color image cryptosystem based on dynamic dna encryption and chaos publication-title: Signal Process doi: 10.1016/j.sigpro.2018.09.029 – year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0081 article-title: Modified RSA encryption algorithm based on chaos and its application in voice encryption system – volume: 18 start-page: 109 issue: 1 year: 2013 ident: 10.1016/j.jisa.2019.102421_bib0091 article-title: A fast and efficient chaos-based keyed hash function publication-title: Commun Nonlinear Sci Numer Simul doi: 10.1016/j.cnsns.2012.06.019 – volume: 111 start-page: 196 year: 2019 ident: 10.1016/j.jisa.2019.102421_bib0014 article-title: A secure image encryption method using scan pattern and random key stream derived from laser chaos publication-title: Opt Laser Technol doi: 10.1016/j.optlastec.2018.09.048 – volume: 6 start-page: 55405 year: 2018 ident: 10.1016/j.jisa.2019.102421_bib0108 article-title: A new 1d chaotic map and β-hill climbing for generating substitution-boxes publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2871557 – volume: 11 start-page: e0153870 issue: 4 year: 2016 ident: 10.1016/j.jisa.2019.102421_bib0111 article-title: An extended chaotic maps-based three-party password-authenticated key agreement with user anonymity publication-title: PLOS ONE doi: 10.1371/journal.pone.0153870 – ident: 10.1016/j.jisa.2019.102421_bib0087 doi: 10.1007/s11071-019-04809-w |
| SSID | ssj0001219523 |
| Score | 2.4406598 |
| Snippet | Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 102421 |
| SubjectTerms | Authentication Chaos theory Cryptanalysis Cryptography Image encryption Security |
| Title | Implementation and practical problems of chaos-based cryptography revisited |
| URI | https://dx.doi.org/10.1016/j.jisa.2019.102421 |
| Volume | 50 |
| WOSCitedRecordID | wos000505033600010&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: ScienceDirect issn: 2214-2126 databaseCode: AIEXJ dateStart: 20130701 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0001219523 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lj9MwELagy4ELLC_tA5AP3CqjOo2d-FitFsEiVkj00Ftkx7baakmrJsDy7xk_4s3uohUgcYmiqHaqmU_jz87MNwi9mRjJgSZkxKqpJhDwLBGwEpLCCiVFyRXV0jebKM7Py8VCfI7trVrfTqBomvLyUmz_q6vhGTjblc7-hbvTpPAA7sHpcAW3w_WPHO_1fr_GkqImCgH4UihXdBX6x_j8jXopNy1xy5ge17uf2y6qV_tyljaVPd1mrlFs1U_fxv53QfR18DU8HQmYZciigbCUgDi7kD9W2vPWTxvZtVEPwp30rHx6AQSh8cnSxGU1nkrAFnRyLcMjlctc5SZBRMsymhNYK_kw_Abd2VuRPBwqrN-u3Td9YCnCiUzkoZr6hkL2FzevmxbIqKuVze-jvaxgohyhvdmH08XZ4NCNCuZb_qW_EgupQs7fzZf9nqwMCMh8Hz2K9sez4PEn6J5pnqLHfVcOHIP0M_TxOgAwOAYnAOAeAHhj8QAAeAgAnADwHM3fnc5P3pPYMoPUU847Art1rZXTACyBiLIp00JqaZSYSKos7LUnuWIcWDdj1lLFc0OltdJyw4SRdvoCjZpNYw4QZsD7tKKZ5rbMhVJCFFIKpgwVtaaqOES0N01VRzl519XkourzBteVM2flzFkFcx6icRqzDWIqd_6a9RavIh0MNK8CjNwx7ugfxx2jh1dIfolG3e6beYUe1N-7Vbt7HaH0C2Xbh-A |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Implementation+and+practical+problems+of+chaos-based+cryptography+revisited&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Teh%2C+Je+Sen&rft.au=Alawida%2C+Moatsum&rft.au=Sii%2C+You+Cheng&rft.date=2020-02-01&rft.pub=Elsevier+Ltd&rft.issn=2214-2126&rft.volume=50&rft_id=info:doi/10.1016%2Fj.jisa.2019.102421&rft.externalDocID=S2214212619306544 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon |