Authors:
(1) Sheng Liu, School of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, Hunan, China;
(2) Chengqing Li (Corresponding author), School of Computer Science, Xiangtan University, Xiangtan 411105, Hunan, China;
(3) Qiao Hu, School of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, Hunan, China.
Table of Links
2. Description of two analyzed image encryption algorithms
5. Conclusion, Acknowledgements, and References
3. Cryptanalysis of IEATD
3.2. The chosen-plaintext attack proposed by M. Li et al.
To make the cryptanalysis of IEATD more complete, we briefly introduce the chosen-plaintext attack on IEATD proposed by M. Li et al. in [13] and comment its performance:
3.3. Known-plaintext attack on IEATD
This paper is available on arxiv under CC by 4.0 Deed (Attribution 4.0 International) license.