Skip to main content

Showing 1–4 of 4 results for author: Xie, E Y

  1. Periodicity Analysis of the Logistic Map over Ring $\mathbb{Z}_{3^n}$

    Authors: Xiaoxiong Lu, Eric Yong Xie, Chengqing Li

    Abstract: Periodicity analysis of sequences generated by a deterministic system is a long-standing challenge in both theoretical research and engineering applications. To overcome the inevitable degradation of the Logistic map on a finite-precision circuit, its numerical domain is commonly converted from a real number field to a ring or a finite field. This paper studies the period of sequences generated by… ▽ More

    Submitted 13 April, 2023; originally announced April 2023.

    Comments: 10 pages

    MSC Class: 65P20

    Journal ref: International Journal of Bifurcation and Chaos, vol. 33, no. 5, art. no. 2350063, 2023

  2. arXiv:1903.11764  [pdf, ps, other

    cs.CR

    When an attacker meets a cipher-image in 2018: A Year in Review

    Authors: Chengqing Li, Yun Zhang, Eric Yong Xie

    Abstract: This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of an image cryptanalyst. The most representative works among them are selected and classified according to their essential structures. Almost all image cryptanalysis works published in 2018 are survey… ▽ More

    Submitted 5 June, 2019; v1 submitted 27 March, 2019; originally announced March 2019.

    Comments: 12 pages

    MSC Class: 94A60

    Journal ref: Journal of Information Security and Applications, 2019

  3. On the cryptanalysis of Fridrich's chaotic image encryption scheme

    Authors: Eric Yong Xie, Chengqing Li, Simin Yu, Jinhu Lü

    Abstract: Utilizing complex dynamics of chaotic maps and systems in encryption was studied comprehensively in the past two and a half decades. In 1989, Fridrich's chaotic image encryption scheme was designed by iterating chaotic position permutation and value substitution some rounds, which received intensive attention in the field of chaos-based cryptography. In 2010, Solak \textit{et al.} proposed a chose… ▽ More

    Submitted 10 October, 2016; v1 submitted 17 September, 2016; originally announced September 2016.

    Comments: 7 pages, 7 figures, Signal Processing, 2017

    MSC Class: 94A60

  4. Deciphering a novel image cipher based on mixed transformed Logistic maps

    Authors: Yuansheng Liu, Hua Fan, Eric Yong Xie, Ge Cheng, Chengqing Li

    Abstract: Since John von Neumann suggested utilizing Logistic map as a random number generator in 1947, a great number of encryption schemes based on Logistic map and/or its variants have been proposed. This paper re-evaluates the security of an image cipher based on transformed logistic maps and proves that the image cipher can be deciphered efficiently under two different conditions: 1) two pairs of known… ▽ More

    Submitted 29 September, 2016; v1 submitted 14 April, 2014; originally announced April 2014.

    Comments: 10 pages, 2 figures

    MSC Class: 68P25; 94A60

    Journal ref: International Journal of Bifurcation and Chaos, 25(13): 1550188, 2015