Breaking a Chaotic Cryptographic Scheme Based on Composition Maps. Li, C., Arroyo, D., & Lo, K. CoRR, 2009.
Paper bibtex @article{DBLP:journals/corr/abs-0907-3177,
author = {Chengqing Li and
David Arroyo and
Kwok{-}Tung Lo},
title = {Breaking a Chaotic Cryptographic Scheme Based on Composition Maps},
journal = {CoRR},
volume = {abs/0907.3177},
year = {2009},
url = {http://arxiv.org/abs/0907.3177},
eprinttype = {arXiv},
eprint = {0907.3177},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-0907-3177.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"5uKzK3QS2bzzFqTtF","bibbaseid":"li-arroyo-lo-breakingachaoticcryptographicschemebasedoncompositionmaps-2009","author_short":["Li, C.","Arroyo, D.","Lo, K."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Chengqing"],"propositions":[],"lastnames":["Li"],"suffixes":[]},{"firstnames":["David"],"propositions":[],"lastnames":["Arroyo"],"suffixes":[]},{"firstnames":["Kwok-Tung"],"propositions":[],"lastnames":["Lo"],"suffixes":[]}],"title":"Breaking a Chaotic Cryptographic Scheme Based on Composition Maps","journal":"CoRR","volume":"abs/0907.3177","year":"2009","url":"http://arxiv.org/abs/0907.3177","eprinttype":"arXiv","eprint":"0907.3177","timestamp":"Mon, 13 Aug 2018 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/corr/abs-0907-3177.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/corr/abs-0907-3177,\n author = {Chengqing Li and\n David Arroyo and\n Kwok{-}Tung Lo},\n title = {Breaking a Chaotic Cryptographic Scheme Based on Composition Maps},\n journal = {CoRR},\n volume = {abs/0907.3177},\n year = {2009},\n url = {http://arxiv.org/abs/0907.3177},\n eprinttype = {arXiv},\n eprint = {0907.3177},\n timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/corr/abs-0907-3177.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Li, C.","Arroyo, D.","Lo, K."],"key":"DBLP:journals/corr/abs-0907-3177","id":"DBLP:journals/corr/abs-0907-3177","bibbaseid":"li-arroyo-lo-breakingachaoticcryptographicschemebasedoncompositionmaps-2009","role":"author","urls":{"Paper":"http://arxiv.org/abs/0907.3177"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/72/4580.bib","dataSources":["6nkKxoyWYfydKR8aF"],"keywords":[],"search_terms":["breaking","chaotic","cryptographic","scheme","based","composition","maps","li","arroyo","lo"],"title":"Breaking a Chaotic Cryptographic Scheme Based on Composition Maps","year":2009}