The SCEAS System
| |||||||

## Search the dblp DataBase
Chengqing Li:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Chengqing Li, Xinxiao Li, Shujun Li, Guanrong Chen
**Cryptanalysis of a multistage encryption system.**[Citation Graph (0, 0)][DBLP] ISCAS (2), 2005, pp:880-883 [Conf] - Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
**Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher.**[Citation Graph (0, 0)][DBLP] ISNN (2), 2005, pp:630-636 [Conf] - Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
**Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme.**[Citation Graph (0, 0)][DBLP] PCM (3), 2004, pp:418-425 [Conf] - Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
**On the security of the Yen-Guo's domino signal encryption algorithm (DSEA).**[Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2006, v:79, n:2, pp:253-258 [Journal] - Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
**Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258].**[Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2006, v:79, n:12, pp:1789- [Journal] - Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
**On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)**[Citation Graph (0, 0)][DBLP] CoRR, 2005, v:0, n:, pp:- [Journal] - Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen
**Cryptanalysis of an Encryption Scheme Based on Blind Source Separation**[Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal] - Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen, Kwok-Tung Lo
**Cryptanalysis of a chaotic block cipher with external key and its improved version**[Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal] - David Arroyo, Chengqing Li, Shujun Li, Gonzalo Álvarez, Wolfgang A. Halang
**Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm**[Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal] - David Arroyo, Chengqing Li, Shujun Li, Gonzalo Álvarez
**Cryptanalysis of a computer cryptography scheme based on a filter bank**[Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal] - Chengqing Li, Shujun Li, Xiaofeng Liao, Guanrong Chen
**Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher**[Citation Graph (0, 0)][DBLP] CoRR, 2004, v:0, n:, pp:- [Journal] **On the security of a class of image encryption schemes.**[Citation Graph (, )][DBLP]**Cryptanalysis of an Image Encryption Scheme Using Cellular Automata Substitution and SCAN.**[Citation Graph (, )][DBLP]**Cryptanalysis of an image encryption scheme based on the Hill cipher**[Citation Graph (, )][DBLP]**Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence**[Citation Graph (, )][DBLP]**Breaking a new substitution-diffusion based image cipher using chaotic standard and logistic maps**[Citation Graph (, )][DBLP]**Breaking a Chaotic Cryptographic Scheme Based on Composition Maps**[Citation Graph (, )][DBLP]**A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS)**[Citation Graph (, )][DBLP]**Security analysis of a binary image permutation scheme based on Logistic map**[Citation Graph (, )][DBLP]**Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps**[Citation Graph (, )][DBLP]**Breaking an image encryption algorithm based on chaos**[Citation Graph (, )][DBLP]
Search in 0.027secs, Finished in 0.028secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |