Security on a cryptographic model based on chaos

The application of chaos in cryptography has attracted much attention,however,most of them were cracked soon after publications.To find why they are so weak under the attack to their chaotic signal streams,some chaotic cryptosystems were investigated.A mathematical model was then derived from these...

Full description

Saved in:
Bibliographic Details
Main Authors: WEI Jun1, LIAO Xiao-feng2, YANG Ji-yun2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2008-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74653542/
Tags: Add Tag
No Tags, Be the first to tag this record!