Login / Signup
On the security defects of an image encryption scheme.
Chengqing Li
Shujun Li
Muhammad Asim
Juana Nunez
Gonzalo Álvarez
Guanrong Chen
Published in:
IACR Cryptol. ePrint Arch. (2007)
Keyphrases
</>
image encryption scheme
encryption scheme
image encryption
security analysis
chaotic maps
security requirements
intrusion detection
network security
security policies
private key
security issues
data sharing
security protocols
standard model
authentication scheme
chaotic sequence
data management