Chosen Text Attacks Against an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map.
George TeseleanuPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- image encryption
- chosen plaintext attack
- image encryption scheme
- high security
- authentication scheme
- chaotic maps
- stream cipher
- encryption algorithms
- security analysis
- image encryption algorithm
- image scrambling
- cosine transform
- wireless communication
- secret sharing scheme
- public key
- transfer function
- watermarking scheme
- private key
- secret sharing