Loading publications…
The last 5 uploaded publications
On the security defects of an image encryption scheme
Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Álvarez, Guanrong Chen (2009). On the security defects of an image encryption scheme. Image and Vision Computing, 27(9), pp. 1371-1381, DOI: 10.1016/j.imavis.2008.12.008.
Article146 days agoBreaking a chaos-based secure communication scheme designed by an improved modulation method
Shujun Li, Gonzalo Álvarez, Guanrong Chen (2004). Breaking a chaos-based secure communication scheme designed by an improved modulation method. Chaos Solitons & Fractals, 25(1), pp. 109-120, DOI: 10.1016/j.chaos.2004.09.077.
Article146 days agoCryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen, Kwok‐Tung Lo (2007). Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Physics Letters A, 369(1-2), pp. 23-30, DOI: 10.1016/j.physleta.2007.04.023.
Article146 days agoCryptanalysis of a chaotic block cipher with external key and its improved version
Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen, Kwok‐Tung Lo (2006). Cryptanalysis of a chaotic block cipher with external key and its improved version. Chaos Solitons & Fractals, 37(1), pp. 299-307, DOI: 10.1016/j.chaos.2006.08.025.
Article146 days agoRETURN-MAP CRYPTANALYSIS REVISITED
Shujun Li, Guanrong Chen, Gonzalo Álvarez (2006). RETURN-MAP CRYPTANALYSIS REVISITED. International Journal of Bifurcation and Chaos, 16(05), pp. 1557-1568, DOI: 10.1142/s0218127406015507.
Article146 days ago