-
2
-
-
77950424700
-
"Combining data compression and encryption"
-
Anaheim CA, Sep., 27-29
-
C. Finnila, "Combining data compression and encryption," in WESCON/94 "Idea/Microelectronics" Conf. Rec., Anaheim, CA, Sep., 27-29 1994, pp. 404-409.
-
(1994)
WESCON/94 "Idea/Microelectronics" Conf. Rec.
, pp. 404-409
-
-
Finnila, C.1
-
3
-
-
0039333597
-
"Clarifying chaos: Examples and counterexamples"
-
R. Brown and L. O. Chua, "Clarifying chaos: Examples and counterexamples," Int. J. Bifurc. Chaos, vol. 6, no. 2, pp. 219-249, 1996.
-
(1996)
Int. J. Bifurc. Chaos
, vol.6
, Issue.2
, pp. 219-249
-
-
Brown, R.1
Chua, L.O.2
-
4
-
-
0032089417
-
"Symmetric ciphers based on two-dimensional chaotic maps"
-
J. Fridrich, "Symmetric ciphers based on two-dimensional chaotic maps," Int. J. Bifurc. Chaos, vol. 8, no. 6, pp. 1259-1284, 1998.
-
(1998)
Int. J. Bifurc. Chaos
, vol.8
, Issue.6
, pp. 1259-1284
-
-
Fridrich, J.1
-
5
-
-
0031641422
-
"From chaotic maps to encryption schemes"
-
Monterey, CA, May-June, 31-3
-
L. Kocarev, G. Jakimoski, T. Stojanovski, and U. Parlitz, "From chaotic maps to encryption schemes," in Proc. IEEE Symp. Circuits Syst.. Monterey, CA, May-June, 31-3 1998, pp. 514-517.
-
(1998)
Proc. IEEE Symp. Circuits Syst.
, pp. 514-517
-
-
Kocarev, L.1
Jakimoski, G.2
Stojanovski, T.3
Parlitz, U.4
-
6
-
-
0033358930
-
"Chaotic cryptosystems"
-
Madrid, Spain, Oct. 4-8
-
G. Alvarez, G. P. F. Monotoya, G. Pastor, and M. Romera, "Chaotic cryptosystems," in Proc. IEEE 33rd Ann. Int. Carnahan Conf. Security Technol., Madrid, Spain, Oct. 4-8, 1999, pp. 332-338.
-
(1999)
Proc. IEEE 33rd Ann. Int. Carnahan Conf. Security Technol.
, pp. 332-338
-
-
Alvarez, G.1
Monotoya, G.P.F.2
Pastor, G.3
Romera, M.4
-
7
-
-
0035679986
-
"Chaos and cryptography"
-
Dec
-
F. Dachselt and W. Schwarz, "Chaos and cryptography," IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., vol. 48, no. 12, pp. 1498-1509, Dec. 2001.
-
(2001)
IEEE Trans. Circuits Syst. I, Fundam. Theory Appl.
, vol.48
, Issue.12
, pp. 1498-1509
-
-
Dachselt, F.1
Schwarz, W.2
-
8
-
-
4444346865
-
"Chaos-based cryptography: A brief overview"
-
Mar
-
L. Kocarev, "Chaos-based cryptography: A brief overview," IEEE Circuits Syst. Mag., vol. 1, no. 3, pp. 6-21, Mar. 2001.
-
(2001)
IEEE Circuits Syst. Mag.
, vol.1
, Issue.3
, pp. 6-21
-
-
Kocarev, L.1
-
9
-
-
84974731225
-
"Pseudo-random bit generator based on couple chaotic systems and its application in stream-ciphers cryptography"
-
Chennai, India: Springer-Verlag, Dec. 16-20
-
S. Li, X. Mou, and Y. Cai, "Pseudo-random bit generator based on couple chaotic systems and its application in stream-ciphers cryptography," in Progress in Cryptology - INDOCRYPT 2001. Chennai, India: Springer-Verlag, Dec. 16-20, 2001, pp. 316-329.
-
(2001)
Progress in Cryptology - INDOCRYPT 2001
, pp. 316-329
-
-
Li, S.1
Mou, X.2
Cai, Y.3
-
10
-
-
84950900200
-
"On the derivation of a chaotic encryption algorithm"
-
R. Matthews, "On the derivation of a chaotic encryption algorithm," Cryptologia, vol. XIII, no. 1, pp. 29-42, 1989.
-
(1989)
Cryptologia
, vol.13
, Issue.1
, pp. 29-42
-
-
Matthews, R.1
-
11
-
-
0042786512
-
"Cryptography with chaos"
-
M. BaptistaS, "Cryptography with chaos," Phys. Lett. A, vol. 240, no. 1-2, pp. 50-54, 1998.
-
(1998)
Phys. Lett. A
, vol.240
, Issue.1-2
, pp. 50-54
-
-
Baptistas, M.1
-
13
-
-
0345831120
-
"New approach to chaotic encryption"
-
E. Alvarez, A. Fernández, P. García, J. Jiménez, and A. Marcano, "New approach to chaotic encryption," Phys. Lett. A, vol. 263, pp. 373-375, 1999.
-
(1999)
Phys. Lett. A.
, vol.263
, pp. 373-375
-
-
Alvarez, E.1
Fernández, A.2
García, P.3
Jiménez, J.4
Marcano, A.5
-
14
-
-
0035250017
-
"Chaos and cryptography: Block encryption ciphers based on chaotic maps"
-
Feb
-
G. Jakimoski and L. Kocarev, "Chaos and cryptography: Block encryption ciphers based on chaotic maps," IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., vol. 48, no. 2, pp. 163-169, Feb. 2001.
-
(2001)
IEEE Trans. Circuits Syst. I, Fundam. Theory Appl.
, vol.48
, Issue.2
, pp. 163-169
-
-
Jakimoski, G.1
Kocarev, L.2
-
15
-
-
0000966372
-
"Logistic map as a block encryption algorithm"
-
L. Kocarev and G. Jakimoski, "Logistic map as a block encryption algorithm," Phys. Lett. A, vol. 289, no. 4-5, pp. 199-206, 2001.
-
(2001)
Phys. Lett. A, Vol.
, vol.289
, Issue.4-5
, pp. 199-206
-
-
Kocarev, L.1
Jakimoski, G.2
-
16
-
-
0037053849
-
"A fast chaotic cryptographic scheme with dynamic look-up table"
-
K. W. Wong, "A fast chaotic cryptographic scheme with dynamic look-up table," Phys. Lett. A, vol. 298, no. 4, pp. 238-242, 2002.
-
(2002)
Phys. Lett. A
, vol.298
, Issue.4
, pp. 238-242
-
-
Wong, K.W.1
-
17
-
-
0036404061
-
"Chaotic encryption scheme for real-time digital video"
-
S. Li, X. Zheng, X. Mou, and Y. Cai, "Chaotic encryption scheme for real-time digital video," in Proc. SPIE, vol. 4666, 2002, pp. 149-160.
-
(2002)
Proc. SPIE
, vol.4666
, pp. 149-160
-
-
Li, S.1
Zheng, X.2
Mou, X.3
Cai, Y.4
-
18
-
-
84950879089
-
"Problems with chaotic cryptosystems"
-
D. D. Wheeler, "Problems with chaotic cryptosystems," Cryptologia, vol. XIII, no. 3, pp. 243-250, 1989.
-
(1989)
Cryptologia
, vol.13
, Issue.3
, pp. 243-250
-
-
Wheeler, D.D.1
-
19
-
-
84950905409
-
"Supercomputer investigations of a chaotic encryption algorithm"
-
D. D. Wheeler and R. Matthews, "Supercomputer investigations of a chaotic encryption algorithm," Cryptologia, vol. XV, no. 2, pp. 140-151, 1991.
-
(1991)
Cryptologia
, vol.15
, Issue.2
, pp. 140-151
-
-
Wheeler, D.D.1
Matthews, R.2
-
20
-
-
85000391603
-
"Cryptoanalysis of the chaoticmap cryptosystem suggested at EuroCrypt'91"
-
Apr. 8-11
-
E. Biham, "Cryptoanalysis of the chaoticmap cryptosystem suggested at EuroCrypt'91," Adv. Cryptol.-EuroCrypt'91, vol. 0547, pp. 532-534, Apr. 8-11, 1991.
-
(1991)
Adv. Cryptol.-EuroCrypt'91
, vol.547
, pp. 532-534
-
-
Biham, E.1
-
21
-
-
0031098928
-
"Problems with the chaotic inverse system encryption approach"
-
Mar
-
H. Zhou and X.-T. Ling, "Problems with the chaotic inverse system encryption approach," IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., vol. 44, no. 3, pp. 268-271, Mar. 1997.
-
(1997)
IEEE Trans. Circuits Syst. I, Fundam. Theory Appl.
, vol.44
, Issue.3
, pp. 268-271
-
-
Zhou, H.1
Ling, X.-T.2
-
22
-
-
0034735530
-
"Cryptanalysis of a chaotic encryption system"
-
G. Alvarez, F. Montoya, M. Romera, and G. Pastor, "Cryptanalysis of a chaotic encryption system," Phys. Lett. A, vol. 276, pp. 191-196, 2000.
-
(2000)
Phys. Lett. A
, vol.276
, pp. 191-196
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
23
-
-
0005205415
-
"Analysis of some recently proposed chaos-based encryption algorithms"
-
G. Jakimoski and L. Kocarev, "Analysis of some recently proposed chaos-based encryption algorithms," Phys. Lett. A, vol. 291, no. 6, pp. 381-384, 2001.
-
(2001)
Phys. Lett. A
, vol.291
, Issue.6
, pp. 381-384
-
-
Jakimoski, G.1
Kocarev, L.2
-
24
-
-
18244420943
-
"Improving security of a chaotic encryption approach"
-
S. Li, X. Mou, and Y. Cai, "Improving security of a chaotic encryption approach," Phys. Lett. A, vol. 290, no. 3/4, pp. 127-133.
-
Phys. Lett. A
, vol.290
, Issue.3-4
, pp. 127-133
-
-
Li, S.1
Mou, X.2
Cai, Y.3
-
25
-
-
0038285043
-
"On the security of a chaotic encryption scheme: Problems with computerized chaos in finite computing precision"
-
S. Li, X. Mou, Y. Cai, Z. Ji, and J. Zhang, "On the security of a chaotic encryption scheme: Problems with computerized chaos in finite computing precision," Comp. Phys. Commun., vol. 153, no. 1, pp. 52-58, 2003.
-
(2003)
Comp. Phys. Commun.
, vol.153
, Issue.1
, pp. 52-58
-
-
Li, S.1
Mou, X.2
Cai, Y.3
Ji, Z.4
Zhang, J.5
-
26
-
-
0012584447
-
"Problems with a probabilistic encryption scheme based on chaotic systems"
-
S. Li, X. Mou, B. L. Yang, Z. Ji, and J. Zhang, "Problems with a probabilistic encryption scheme based on chaotic systems," Int. J. Bifurc. Chaos, no. 10, pp. 3063-3077, 2003.
-
(2003)
Int. J. Bifurc. Chaos
, Issue.10
, pp. 3063-3077
-
-
Li, S.1
Mou, X.2
Yang, B.L.3
Ji, Z.4
Zhang, J.5
-
27
-
-
0021547328
-
"Linear congruential generators do not produce random sequences"
-
Singer Island, FL, Oct. 24-26
-
A. M. Frieze, R. Kannan, and J. C. Lagarias, "Linear congruential generators do not produce random sequences," in Proc. 25th Ann. Symp. Found. Comp. Sci., Singer Island, FL, Oct. 24-26, 1984, pp. 480-484.
-
(1984)
Proc. 25th Ann. Symp. Found. Comp. Sci.
, pp. 480-484
-
-
Frieze, A.M.1
Kannan, R.2
Lagarias, J.C.3
-
28
-
-
0023576573
-
"Secret linear congruential generators are not cryptographically secure"
-
Los Angeles, CA, Oct. 12-14
-
J. Stern, "Secret linear congruential generators are not cryptographically secure," in Proc. 25th Ann. Symp. Found. Comp. Sci., Los Angeles, CA, Oct. 1214, 1987, pp. 421-426.
-
(1987)
Proc. 25th Ann. Symp. Found. Comp. Sci.
, pp. 421-426
-
-
Stern, J.1
-
29
-
-
24344510301
-
"Cryptanalysis of a new signal security system for multimedia data transmissions"
-
C. Li, S. Li, G. Chen, G. Chen, and L. Hu, "Cryptanalysis of a new signal security system for multimedia data transmissions," EURASIP J. Appl. Signal Process., vol. 2005, no. 8, pp. 1277-1288, 2005.
-
(2005)
EURASIP J. Appl. Signal Process.
, vol.2005
, Issue.8
, pp. 1277-1288
-
-
Li, C.1
Li, S.2
Chen, G.3
Chen, G.4
Hu, L.5
-
30
-
-
4243066342
-
"A system of high-dimensional, efficient, long-cycle and portable uniform random number generators"
-
L. Y. Deng and H. Xu, "A system of high-dimensional, efficient, long-cycle and portable uniform random number generators," ACM Trans. Model. Comp. Simul., vol. 13, no. 4, pp. 299-309, 2003.
-
(2003)
ACM Trans. Model. Comp. Simul.
, vol.13
, Issue.4
, pp. 299-309
-
-
Deng, L.Y.1
Xu, H.2
-
31
-
-
3843123100
-
"On the deng-lin random number generators and related methods"
-
P. L'Ecuyer and R. Touzin, "On the deng-lin random number generators and related methods," Stat. Comput., vol. 14, no. 2004, pp. 5-9, 2004.
-
(2004)
Stat. Comput.
, vol.14
, Issue.2004
, pp. 5-9
-
-
L'Ecuyer, P.1
Touzin, R.2
-
32
-
-
0023364261
-
"Arithmetic coding for data compression"
-
I. H. Witten, R. M. Neal, and J. G. Cleary, "Arithmetic coding for data compression," Commun. ACM, vol. 30, no. 6, pp. 520-540, 1987.
-
(1987)
Commun. ACM
, vol.30
, Issue.6
, pp. 520-540
-
-
Witten, I.H.1
Neal, R.M.2
Cleary, J.G.3
-
33
-
-
0001561777
-
"Analysis of arithmetic coding for data compression"
-
P. G. Howard and J. S. Vitter, "Analysis of arithmetic coding for data compression," Inf. Process. Manag., vol. 28, no. 6, pp. 749-763, 1992.
-
(1992)
Inf. Process. Manag.
, vol.28
, Issue.6
, pp. 749-763
-
-
Howard, P.G.1
Vitter, J.S.2
-
34
-
-
0007947368
-
"Practical implementation of arithmetic coding"
-
J. A. Storer, Ed. Norwell, MA: Kluwer Academic
-
P. G. Howard and J. S. Vitter, "Practical implementation of arithmetic coding," in Image and Text Compression, J. A. Storer, Ed. Norwell, MA: Kluwer Academic, 1992, pp. 85-112.
-
(1992)
Image and Text Compression
, pp. 85-112
-
-
Howard, P.G.1
Vitter, J.S.2
-
35
-
-
0032108353
-
"Arithmetic coding revisited"
-
A. Moffat, R. M. Neal, and I. H. Witten, "Arithmetic coding revisited," ACM Trans. Inf. Syst., vol. 16, no. 3, pp. 256-294, 1998.
-
(1998)
ACM Trans. Inf. Syst.
, vol.16
, Issue.3
, pp. 256-294
-
-
Moffat, A.1
Neal, R.M.2
Witten, I.H.3
-
36
-
-
0026915986
-
"Data security in a fixed-model arithmetic coding compression algorithm"
-
H. A. Bergen and J. M. Hogan, "Data security in a fixed-model arithmetic coding compression algorithm," Comp. Secur., vol. 11, pp. 445-461, 1992.
-
(1992)
Comp. Secur.
, vol.11
, pp. 445-461
-
-
Bergen, H.A.1
Hogan, J.M.2
-
37
-
-
0027561382
-
"A chosen plaintext attack on an adaptive arithmetic coding compression algorithm"
-
H. A. Bergen and J. M. Hogan, "A chosen plaintext attack on an adaptive arithmetic coding compression algorithm," Comp. Secur., vol. 12, pp. 157-167, 1993.
-
(1993)
Comp. Secur.
, vol.12
, pp. 157-167
-
-
Bergen, H.A.1
Hogan, J.M.2
-
38
-
-
0024055716
-
"On the privacy afforded by adaptive text compression"
-
I. H. Witten and J. G. Cleary, "On the privacy afforded by adaptive text compression," Comp. Secur., vol. 7, pp. 397-408, 1988.
-
(1988)
Comp. Secur.
, vol.7
, pp. 397-408
-
-
Witten, I.H.1
Cleary, J.G.2
-
39
-
-
0032663111
-
"Resynchronization properties of Arithmetic Coding"
-
Snowbird, UT, Mar. 29-31
-
P. W. Moo and X. Wu, "Resynchronization properties of Arithmetic Coding," in Proc. IEEE Data Compr. Conf., Snowbird, UT, Mar. 29-31, 1999, p. 540.
-
(1999)
Proc. IEEE Data Compr. Conf.
, pp. 540
-
-
Moo, P.W.1
Wu, X.2
-
40
-
-
0032667056
-
"Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients"
-
Florence, Italy, Jun. 7-11
-
X. Wu and P. W. Moo, "Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients," in Proc. IEEE Int. Multimedia Comput. Syst., vol. 2, Florence, Italy, Jun. 7-11, 1999, pp. 908-912.
-
(1999)
Proc. IEEE Int. Multimedia Comput. Syst.
, vol.2
, pp. 908-912
-
-
Wu, X.1
Moo, P.W.2
-
41
-
-
84892526019
-
"Statistical properties of digital piecewise-linear chaotic maps and their roles in cryptography and pseudorandom coding"
-
Berlin, Germany: Springer-Verlag
-
S. Li, Q. Li, W. Li, X. Mou, and Y. Cai, "Statistical properties of digital piecewise-linear chaotic maps and their roles in cryptography and pseudorandom coding," in Cryptography and Coding - 8th IMA International Conference Proceeding. Berlin, Germany: Springer-Verlag, 2001, pp. 205-221.
-
(2001)
Cryptography and Coding - 8th IMA International Conference Proceeding
, pp. 205-221
-
-
Li, S.1
Li, Q.2
Li, W.3
Mou, X.4
Cai, Y.5
-
42
-
-
0032050353
-
"Perturbance-based algorithm to expand cycle length of chaotic key stream"
-
S. Tao, W. Ruili, and Y. Yixun, "Perturbance-based algorithm to expand cycle length of chaotic key stream," Electron. Lett., vol. 34, no. 9, pp. 873-874, 1998.
-
(1998)
Electron. Lett.
, vol.34
, Issue.9
, pp. 873-874
-
-
Tao, S.1
Ruili, W.2
Yixun, Y.3
-
43
-
-
0032180956
-
"Clock-controlled chaotic keystream generators"
-
S. Tao, W. Ruili, and Y. Yixun, "Clock-controlled chaotic keystream generators," Electron. Lett., vol. 34, no. 20, pp. 1932-1934, 1998.
-
(1998)
Electron. Lett.
, vol.34
, Issue.20
, pp. 1932-1934
-
-
Tao, S.1
Ruili, W.2
Yixun, Y.3
-
44
-
-
0017185443
-
"Simple mathematical models with very complicated dynamics"
-
R. M. May, "Simple mathematical models with very complicated dynamics," Nature, vol. 261, no. 5560, pp. 459-467, 1976.
-
(1976)
Nature
, vol.261
, Issue.5560
, pp. 459-467
-
-
May, R.M.1
-
45
-
-
0033280886
-
"A study of complexity of chaotic time series and prediction accuracy"
-
Aug., 2225
-
T. Iokibe, M. Koyama, and M. Taniguchi, "A study of complexity of chaotic time series and prediction accuracy," in Proc. IEEE Fuzzy Syst. Conf., Aug., 2225 1999, pp. U-1004-U-1008.
-
(1999)
Proc. IEEE Fuzzy Syst. Conf.
-
-
Iokibe, T.1
Koyama, M.2
Taniguchi, M.3
-
46
-
-
84976741299
-
"Data compression"
-
D. A. Lelewer and D. S. Hirschberg, "Data compression," ACM Comput. Surveys, vol. 19, no. 3, pp. 261-297, 1987.
-
(1987)
ACM Comput. Surveys
, vol.19
, Issue.3
, pp. 261-297
-
-
Lelewer, D.A.1
Hirschberg, D.S.2
-
47
-
-
0028393228
-
"A new data structure for cumulative frequency tables"
-
P. M. Fenwick, "A new data structure for cumulative frequency tables," Softw. Pract. Exper., vol. 24, no. 3, pp. 327-336, 1994.
-
(1994)
Softw. Pract. Exper.
, vol.24
, Issue.3
, pp. 327-336
-
-
Fenwick, P.M.1
|