Reconstructing the keystream from a chaotic encryption scheme | IEEE Journals & Magazine | IEEE Xplore