Some basic cryptographic requirements for chaos-based cryptosystems G Alvarez, S Li International journal of bifurcation and chaos 16 (08), 2129-2151, 2006 | 1387 | 2006 |
Puma: Permission usage to detect malware in android B Sanz, I Santos, C Laorden, X Ugarte-Pedrero, PG Bringas, G Álvarez International Joint Conference CISIS’12-ICEUTE 12-SOCO 12 Special Sessions …, 2013 | 283 | 2013 |
Cryptanalysis of an ergodic chaotic cipher G Alvarez, F Montoya, M Romera, G Pastor Physics Letters A 311 (2-3), 172-179, 2003 | 228 | 2003 |
On the security defects of an image encryption scheme C Li, S Li, M Asim, J Nunez, G Alvarez, G Chen Image and Vision Computing 27 (9), 1371-1381, 2009 | 184 | 2009 |
Cryptanalysis of a discrete chaotic cryptosystem using external key G Alvarez, F Montoya, M Romera, G Pastor Physics Letters A 319 (3-4), 334-339, 2003 | 140 | 2003 |
Cryptanalysis of a chaotic encryption system G Alvarez, F Montoya, M Romera, G Pastor Physics Letters A 276 (1-4), 191-196, 2000 | 138 | 2000 |
Cryptanalysis of dynamic look-up table based chaotic cryptosystems G Alvarez, F Montoya, M Romera, G Pastor Physics Letters A 326 (3-4), 211-218, 2004 | 137 | 2004 |
On the security of a new image encryption scheme based on chaotic map lattices D Arroyo, R Rhouma, G Alvarez, S Li, V Fernandez Chaos: An Interdisciplinary Journal of Nonlinear Science 18 (3), 033112, 2008 | 131 | 2008 |
Chaotic cryptosystems G Alvarez, P Montoya, G Pastor, M Romera Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on …, 1999 | 116 | 1999 |
A new taxonomy of web attacks suitable for efficient encoding G Álvarez, S Petrović Computers & Security 22 (5), 435-449, 2003 | 114 | 2003 |
Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm D Arroyo, C Li, S Li, G Alvarez, WA Halang Chaos, Solitons & Fractals 41 (5), 2613-2616, 2009 | 111 | 2009 |
Breaking projective chaos synchronization secure communication using filtering and generalized synchronization G Alvarez, S Li, F Montoya, G Pastor, M Romera Chaos, Solitons & Fractals 24 (3), 775-783, 2005 | 109 | 2005 |
Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption G Alvarez, S Li Communications in Nonlinear Science and Numerical Simulation 14 (11), 3743-3749, 2009 | 108 | 2009 |
Breaking parameter modulated chaotic secure communication system G Alvarez, F Montoya, M Romera, G Pastor Chaos, Solitons & Fractals 21 (4), 783-787, 2004 | 105 | 2004 |
Breaking two secure communication systems based on chaotic masking G Alvarez, F Montoya, M Romera, G Pastor IEEE Transactions on Circuits and Systems II: Express Briefs 51 (10), 505-506, 2004 | 104 | 2004 |
Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations C Li, S Li, G Alvarez, G Chen, KT Lo Physics Letters A 369 (1-2), 23-30, 2007 | 102 | 2007 |
Breaking a chaos-based secure communication scheme designed by an improved modulation method S Li, G Alvarez, G Chen Chaos, Solitons & Fractals 25 (1), 109-120, 2005 | 98 | 2005 |
Breaking an encryption scheme based on chaotic baker map G Alvarez, S Li Physics Letters A 352 (1-2), 78-82, 2006 | 85 | 2006 |
Keystream cryptanalysis of a chaotic cryptographic method G Alvarez, F Montoya, M Romera, G Pastor Computer Physics Communications 156 (2), 205-207, 2004 | 85 | 2004 |
On the inadequacy of the logistic map for cryptographic applications D Arroyo, G Alvarez, V Fernandez arXiv preprint arXiv:0805.4355, 2008 | 73 | 2008 |