Loading publications…
The last 5 uploaded publications
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos Bourbakis, Kwok‐Tung Lo (2008). A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing Image Communication, 23(3), pp. 212-223, DOI: 10.1016/j.image.2008.01.003.
Article145 days agoCryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen, Kwok‐Tung Lo (2007). Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Physics Letters A, 369(1-2), pp. 23-30, DOI: 10.1016/j.physleta.2007.04.023.
Article145 days agoOn the security defects of an image encryption scheme
Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Álvarez, Guanrong Chen (2009). On the security defects of an image encryption scheme. Image and Vision Computing, 27(9), pp. 1371-1381, DOI: 10.1016/j.imavis.2008.12.008.
Article145 days agoDynamic Analysis of Digital Chaotic Maps via State-Mapping Networks
Chengqing Li, Bingbing Feng, Shujun Li, Jürgen Kurths, Guanrong Chen (2019). Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I Regular Papers, 66(6), pp. 2322-2335, DOI: 10.1109/tcsi.2018.2888688.
Article145 days agoCryptanalysis of an image encryption scheme based on a compound chaotic sequence
Chengqing Li, Shujun Li, Guanrong Chen, Wolfgang A. Halang (2008). Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image and Vision Computing, 27(8), pp. 1035-1039, DOI: 10.1016/j.imavis.2008.09.004.
Article145 days ago