Login / Signup
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps
Chengqing Li
David Arroyo
Kwok-Tung Lo
Published in:
CoRR (2009)
Keyphrases
</>
secure communication
hash functions
chaotic systems
encryption key
smart card
security analysis
public key encryption
elliptic curve cryptography
hopfield neural network
security protocols
detection scheme
learning algorithm
classification scheme
cellular automata
bit rate
motion estimation
artificial intelligence