- Full text PDF available (18)
- This year (0)
- Last 5 years (2)
- Last 10 years (6)
Journals and Conferences
Recently a new chaotic encryption system has been proposed by E. Alvarez et al. In this paper, several weaknesses of this cryptosystem are pointed out and four successful cryptanalytic attacks are described. 2000 Elsevier Science B.V. All rights reserved.
We discuss a tagging schema and a tagging tool for labeling the rhetorical structure of texts. We also propose a statistical method for measuring agreement of hierarchical structure annotations and we discuss its strengths and weaknesses. The statistical measure we use suggests that annotators can achieve good levels of agreement on the task of determining… (More)
We present a tagging schema and a tagging tool for labeling the rhetorical structure of texts. We focus on presenting the difficulties that we faced in designing a discourse annotation manual and on discussing the choices that we made in order to address these difficulties. We report reliability results concerning our agreement on building the rhetorical… (More)
In recent years, a growing number of cryptosystems based on chaos have been proposed, many of them fundamentally flawed by a lack of robustness and security. In this Letter, we explain how to break a very recent block cipher algorithm based on the logistic map. This cryptosystem uses a 128-bit external key to derive the initial condition and number of… (More)
In recent years many chaotic cryptosystems based on Baptista’s seminal work have been proposed. We analyze the security of two of the newest and most interesting ones, which use a dynamically updated look-up table and also work as stream ciphers. We provide different attack techniques to recover the keystream used by the algorithms. The knowledge of this… (More)
This paper describes the security weakness of a recently proposed improved chaotic encryption method based on the modulation of a signal generated by a chaotic system with an appropriately chosen scalar signal. The aim of the improvement is to avoid the breaking of chaotic encryption schemes by means of the return map attack introduced by Pérez and… (More)
This paper describes the security weakness of a recently proposed secure communication method based on parameter modulation of a chaotic system and adaptive observer-based synchronization scheme. We show that the security is compromised even without precise knowledge of the chaotic system used.
This paper describes the security weakness of a recently proposed secure communication method based on discrete-time chaos synchronization. We show that the security is compromised even without precise knowledge of the chaotic system used. We also make many suggestions to improve its security in future versions.
The external argument theory of Douady and Hubbard allows us to know both the potential and the field-lines in the exterior of the Mandelbrot set. Nonetheless, there are no explicit formulae to operate with external arguments, and the external argument theory is difficult to apply. In this paper we introduce some tools in order to obtain formulae to operate… (More)
This paper describes the security weaknesses of a recently proposed secure communication method based on chaotic masking using projective synchronization of two chaotic systems. We show that the system is insecure and how to break it in two different ways, by high-pass filtering and by generalized synchronization.