Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations | Publicación