This story draft by @escholar has not been reviewed by an editor, YET.

Cryptanalysis of IEATD

EScholar: Electronic Academic Papers for Scholars HackerNoon profile picture
0-item

Authors:

(1) Sheng Liu, School of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, Hunan, China;

(2) Chengqing Li (Corresponding author), School of Computer Science, Xiangtan University, Xiangtan 411105, Hunan, China;

(3) Qiao Hu, School of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, Hunan, China.

Table of Links

Abstract and 1. Introduction

2. Description of two analyzed image encryption algorithms

3. Cryptanalysis of IEATD

4. Cryptanalysis of IEACD

5. Conclusion, Acknowledgements, and References

3. Cryptanalysis of IEATD




3.2. The chosen-plaintext attack proposed by M. Li et al.


To make the cryptanalysis of IEATD more complete, we briefly introduce the chosen-plaintext attack on IEATD proposed by M. Li et al. in [13] and comment its performance:



3.3. Known-plaintext attack on IEATD



This paper is available on arxiv under CC by 4.0 Deed (Attribution 4.0 International) license.


L O A D I N G
. . . comments & more!

About Author

EScholar: Electronic Academic Papers for Scholars HackerNoon profile picture
EScholar: Electronic Academic Papers for Scholars@escholar
We publish the best academic work (that's too often lost to peer reviews & the TA's desk) to the global tech community

Topics

Around The Web...

Trending Topics

blockchaincryptocurrencyhackernoon-top-storyprogrammingsoftware-developmenttechnologystartuphackernoon-booksBitcoinbooks