[1] Alvarez, G., Li, S., 2006. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos, 16(8):2129-2151.
[2] Alvarez, G., Li, S., Hernandez, L., 2007. Analysis of security problems in a medical image encryption system. Comput. Biol. Med., 37(3):424-427.
[3] Hill, L.S., 1929. Cryptography in an algebraic alphabet. Am. Math. Month., 36(6):306-312.
[4] Ismail, I.A., Amin, M., Diab, H., 2006. How to repair the Hill cipher. J. Zhejiang Univ. Sci. A, 7(12):2022-2030.
[5] Li, C., 2005. Cryptanalyses of Some Multimedia Encryption Schemes. MS Thesis, Department of Mathematics, Zhejiang University, Hangzhou, China (in Chinese).
[6] Li, C., Li, S., Zhang, D., Chen, G., 2004. Cryptanalysis of a chaotic neural network based multimedia encryption scheme. LNCS, 3333:418-425.
[7] Li, C., Li, S., Chen, G., Chen, G., Hu, L., 2005a. Cryptanalysis of a new signal security system for multimedia data transmission. EURASIP J. Appl. Signal Process., 2005(8):1277-1288.
[8] Li, C., Li, S., Zhang, D., Chen, G., 2005b. Chosen-plaintext cryptanalysis of a clipped-neural-network-based chaotic cipher. LNCS, 3497:630-636.
[9] Li, C., Li, S., Lou, D.C., 2006. On the security of the Yen-Guo’s domino signal encryption algorithm (DSEA). J. Syst. Soft., 79(2):253-258.
[10] Li, C., Li, S., Alvarez, G., Chen, G., Lo, K.T., 2007a. Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys. Lett. A, 369(1-2):23-30.
[11] Li, C., Li, S., Asim, M., Nunez, J., Alvarez, G., Chen, G., 2007b. On the Security Defects of an Image Encryption Scheme. Cryptology ePrint Archive: Report 2007/397. Available at http://eprint.iacr.org/2007/397, Oct. 6, 2007.
[12] Li, S., 2003. Analyses and New Designs of Digital Chaotic Ciphers. Ph.D Thesis, School of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an, China (in Chinese).
[13] Li, S., Chen, G., Zheng, X., 2004. Chaos-based Encryption for Digital Images and Videos. In: Furht, B., Kirovski, D. (Eds.), Multimedia Security Handbook. CRC Press, LLC, p.133-167.
[14] Li, S., Li, C., Lo, K.T., Chen, G., 2006. Cryptanalysis of an image encryption scheme. J. Electr. Imag., 15(4).
[15] Li, S., Chen, G., Cheung, A., Bhargava, B., Lo, K.T., 2007. On the design of perceptual MPEG-video encryption algorithms. IEEE Trans. on Circuits Syst. Video Technol., 17(2):214-223.
[16] Li, S., Li, C., Chen, G., Mou, X., 2008a. Cryptanalysis of the RCES/RSES image encryption scheme. J. Syst. Soft., 81(7):1130-1143.
[17] Li, S., Li, C., Lo, K.T., Chen, G., 2008b. Cryptanalysis of an image scrambling scheme without bandwidth expansion. IEEE Trans. on Circuits Syst. Video Technol., 18(3):338-349.
[18] Overbey, J., Traves, W., Wojdylo, J., 2005. On the keyspace of the Hill cipher. Cryptologia, 29(1):59-72.
[19] Rangel-Romero, Y., Vega-García, R., Menchaca-Méndez, A., Acoltzi-Cervantes, D., Martínez-Ramos, L., Mecate-Zambrano, M., Montalvo-Lezama, F., Barrón-Vidales, J., Cortez-Duarte, N., Rodríguez-Henríquez, F., 2008. Comments on “How to repair the Hill cipher”. J. Zhejiang Univ. Sci. A, 9(2):211-214.
[20] Shannon, C.E., 1949. Communication theory of secrecy systems. Bell Syst. Tech. J., 28(4):656-715.
[21] Zhou, J., Liang, Z., Chen, Y., Au, O.C., 2007. Security analysis of multimedia encryption schemes based on multiple Huffman table. IEEE Signal Process. Lett., 14(3):201-204.
Open peer comments: Debate/Discuss/Question/Opinion
<1>