Figure 1Schematic of the communications scheme. Messages s1,…,sn are encrypted through their modulation of the coupling functions connecting the two oscillators of the transmitter. Only two signals are transmitted through the public domain. For the particular realization of the cipher discussed in the text, Eqs. (5) and (6), they are x1 and y2. The receiver consists of the same kind of oscillators

