-
1
-
-
0035250017
-
Chaos and cryptography: Block encryption ciphers based on chaotic maps
-
Feb.
-
G. Jakimoski and L. Kocarev, “Chaos and cryptography: Block encryption ciphers based on chaotic maps,” IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., vol. 48, no. 2, pp. 163–169, Feb. 2001.
-
(2001)
IEEE Trans. Circuits Syst. I, Fundam. Theory Appl.
, vol.48
, Issue.2
, pp. 163-169
-
-
Jakimoski, G.1
Kocarev, L.2
-
2
-
-
10944267248
-
On the security of the Yi-Tan-Siew chaotic cipher
-
Dec.
-
S. Le, G. Cheng, and X. Mou, “On the security of the Yi-Tan-Siew chaotic cipher,” IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process., vol. 51, no. 12, pp. 665–669, Dec. 2004.
-
(2004)
IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process.
, vol.51
, Issue.12
, pp. 665-669
-
-
Le, S.1
Cheng, G.2
Mou, X.3
-
3
-
-
23144460039
-
Security of public-key cryptosystems based on Chebyshev polynomials
-
Fundam. Theory Appl. Jul.
-
P. Bergamo, P. Arco, A. Santis, and L. Kocarev, “Security of public-key cryptosystems based on Chebyshev polynomials,” IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., vol. 52, no. 7, pp. 1382–1393, Jul. 2005.
-
(2005)
IEEE Trans. Circuits Syst. I
, vol.52
, Issue.7
, pp. 1382-1393
-
-
Bergamo, P.1
Arco, P.2
Santis, A.3
Kocarev, L.4
-
4
-
-
0042786512
-
Cryptography with chaos
-
M. S. Baptista, “Cryptography with chaos,” Phys. Lett. A, vol. 240, pp. 50–54, 1998.
-
(1998)
Phys. Lett. A
, vol.240
, pp. 50-54
-
-
Baptista, M.S.1
-
5
-
-
0035881532
-
A modified chaotic cryptographic method
-
W. K. Wong, L. P. Lee, and K. W. Wong, “A modified chaotic cryptographic method,” Comp. Phys. Comm., vol. 138, pp. 234–236, 2001.
-
(2001)
Comp. Phys. Comm.
, vol.138
, pp. 234-236
-
-
Wong, W.K.1
Lee, L.P.2
Wong, K.W.3
-
6
-
-
0037190779
-
Cryptography with cycling chaos
-
A. Palacios and H. Juarez, “Cryptography with cycling chaos,” Phys. Lett. A, vol. 303, pp. 345–351, 2002.
-
(2002)
Phys. Lett. A
, vol.303
, pp. 345-351
-
-
Palacios, A.1
Juarez, H.2
-
7
-
-
0037053849
-
A fast chaotic cryptographic scheme with dynamic look-up table
-
K. W. Wong, “A fast chaotic cryptographic scheme with dynamic look-up table,” Phys. Lett. A, vol. 298, pp. 238–242, 2002.
-
(2002)
Phys. Lett. A
, vol.298
, pp. 238-242
-
-
Wong, K.W.1
-
8
-
-
2442684584
-
A combined chaotic cryptographic and hashing scheme
-
K. W. Wong, “A combined chaotic cryptographic and hashing scheme,” Phys. Lett. A, vol. 307, pp. 292–298, 2003.
-
(2003)
Phys. Lett. A
, vol.307
, pp. 292-298
-
-
Wong, K.W.1
-
9
-
-
2442662577
-
Cryptanalysis of dynamic look-up table based chaotic cryptosystems
-
G. Alvarez, F. Montoya, M. Romera, and G. Pastor, “Cryptanalysis of dynamic look-up table based chaotic cryptosystems,” Phys. Lett. A, vol. 326, pp. 211–218, 2004.
-
(2004)
Phys. Lett. A
, vol.326
, pp. 211-218
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
12
-
-
0011285982
-
Design of one-dimensional chaotic maps with prescribed statistical properties
-
Jun.
-
A. Baranousky and D. Daems, “Design of one-dimensional chaotic maps with prescribed statistical properties,” Int. J. Bifurc. Chaos, vol. 5, pp. 1585-1598,Jun. 1995.
-
(1995)
Int. J. Bifurc. Chaos
, vol.5
, pp. 1585-1598
-
-
Baranousky, A.1
Daems, D.2
|