Search


Start a new search
Current filters:
Add filters:

Use filters to refine the search results.


Results 1-10 of 10 (Search time: 0.124 seconds).
  • previous
  • 1
  • next
Item hits:
RightsPreviewIssue DateTitleAuthor(s)Type
1openAccessTwoChanel_PRE.pdf.jpg10-Jun-2008Determination of the Parameters for a Lorenz System and Application to Break the Security of Two-channel Chaotic CryptosystemsOrúe, Amalia B.; Fernández Mármol, Verónica ; Álvarez Marañón, Gonzalo; Pastor, Gerardo; Romera, Miguel; Montoya Vitini, Faustopreprint
2openAccessTwoChanel_PRE.pdf.jpg2-Jul-2008Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystemsOrúe, Amalia B.; Fernández Mármol, Verónica ; Álvarez Marañón, Gonzalo; Pastor, Gerardo; Romera, Miguel; Shujun, Li; Montoya Vitini, Faustoartículo
3openAccessSaferChorRivest.pdf.jpg19-Oct-2008Safer parameters for the Chor–Rivest cryptosystemHernández Encinas, Luis; Muñoz Masqué, Jaime; Queiruga Dios, Araceliartículo
4closedAccessDec-2006Comment on ‘A technique for image encryption using digital signature’Hernández Encinas, Luis; Peinado Domínguez, Albertoartículo
5closedAccessOct-2005Security analysis of communication system based on the synchronization of different order chaotic systemsÁlvarez Marañón, Gonzalo; Hernández Encinas, Luis; Muñoz Masqué, Jaime; Montoya Vitini, Fausto; Li, Shujunartículo
6openAccessJRPIT40.4.255.pdf.jpgNov-2008Linear Cellular Automata as Discrete Models for Generating Cryptographic SequencesCaballero Gil, Pino; Fúster Sabater, Amparo; Delgado, Óscarartículo
7openAccessIJNS_HMM.pdf.jpg1-Sep-2008A weakness in authenticated encryption schemes based on Tseng et al.'s schemesHernández Encinas, Luis; Martín del Rey, Ángel; Muñoz Masqué, Jaimeartículo
8openAccessBBCryptanalysis_Final.pdf.jpgMay-2008Known-Plaintext Attack to Two Cryptosystems Based on the BB EquationÁlvarez Marañón, Gonzalo; Hernández Encinas, Luis; Muñoz Masqué, Jaimeartículo
9openAccessStrategic_Bits_Revised.pdf.jpgMay-2009New Attack Strategy for the Shrinking GeneratorCaballero-Gil, P.; Fúster-Sabater, A.; Pazo-Robles, M.E.artículo
10openAccessCAM9174.pdf.jpg1-Jul-2009A Simple Attack on Some Clock-Controlled GeneratorsCaballero-Gil, P.; Fúster-Sabater, A.preprint