Security Problems of Chaotic Image Encryption Algorithms Based on Cryptanalysis Driven Design Technique
This page contains the code and additional documentation for the cryptanalysis study. You can use the links below for more information.
Wu et al. paper (link)
Zhu and Sun paper (link)
Our Analysis Paper (link)
Wu Image Encryption C# Code (download)
Wu Cryptanalysis Java Code (download)
A small portion of possible a, b, c, and d values (download)
Wu et al. paper (link)
Zhu and Sun paper (link)
Our Analysis Paper (link)
Wu Image Encryption C# Code (download)
Wu Cryptanalysis Java Code (download)
A small portion of possible a, b, c, and d values (download)