A Chaotic Cipher Mmohocc and Its Security Analysis
Xiaowen ZhangLi ShuKe TangPublished in: CoRR (2006)
Keyphrases
- security analysis
- image encryption scheme
- image encryption
- encryption scheme
- high security
- public key
- security requirements
- encryption algorithm
- security model
- smart card
- standard model
- stream cipher
- chaotic sequence
- user authentication
- security properties
- authentication scheme
- mutual authentication
- private key
- ciphertext
- authentication protocol
- high dimensional
- databases
- secret key
- lossless compression
- elliptic curve cryptography
- data sharing