The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chengqing Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chengqing Li, Xinxiao Li, Shujun Li, Guanrong Chen
    Cryptanalysis of a multistage encryption system. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2005, pp:880-883 [Conf]
  2. Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
    Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2005, pp:630-636 [Conf]
  3. Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
    Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    PCM (3), 2004, pp:418-425 [Conf]
  4. Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
    On the security of the Yen-Guo's domino signal encryption algorithm (DSEA). [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:2, pp:253-258 [Journal]
  5. Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
    Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258]. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:12, pp:1789- [Journal]
  6. Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
    On the security of the Yen-Guo's domino signal encryption algorithm (DSEA) [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  7. Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen
    Cryptanalysis of an Encryption Scheme Based on Blind Source Separation [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  8. Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen, Kwok-Tung Lo
    Cryptanalysis of a chaotic block cipher with external key and its improved version [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  9. David Arroyo, Chengqing Li, Shujun Li, Gonzalo Álvarez, Wolfgang A. Halang
    Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  10. David Arroyo, Chengqing Li, Shujun Li, Gonzalo Álvarez
    Cryptanalysis of a computer cryptography scheme based on a filter bank [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  11. Chengqing Li, Shujun Li, Xiaofeng Liao, Guanrong Chen
    Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]

  12. On the security of a class of image encryption schemes. [Citation Graph (, )][DBLP]


  13. Cryptanalysis of an Image Encryption Scheme Using Cellular Automata Substitution and SCAN. [Citation Graph (, )][DBLP]


  14. Cryptanalysis of an image encryption scheme based on the Hill cipher [Citation Graph (, )][DBLP]


  15. Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence [Citation Graph (, )][DBLP]


  16. Breaking a new substitution-diffusion based image cipher using chaotic standard and logistic maps [Citation Graph (, )][DBLP]


  17. Breaking a Chaotic Cryptographic Scheme Based on Composition Maps [Citation Graph (, )][DBLP]


  18. A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS) [Citation Graph (, )][DBLP]


  19. Security analysis of a binary image permutation scheme based on Logistic map [Citation Graph (, )][DBLP]


  20. Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps [Citation Graph (, )][DBLP]


  21. Breaking an image encryption algorithm based on chaos [Citation Graph (, )][DBLP]


Search in 0.027secs, Finished in 0.028secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002