-
1
-
-
2442662577
-
Cryptanalysis of dynamic look-up table based chaotic cryptosystems
-
Alvarez G., Montoya F., Romera M., and Pastor G. Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Physics Letters A 326 (2004) 211-218
-
(2004)
Physics Letters A
, vol.326
, pp. 211-218
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
2
-
-
34447321042
-
EC2C-PAKA: an efficient client-to-client password-authenticated key agreement
-
Byun J.W., Lee D.H., and Lim J.I. EC2C-PAKA: an efficient client-to-client password-authenticated key agreement. Information Sciences 177 (2007) 3995-4013
-
(2007)
Information Sciences
, vol.177
, pp. 3995-4013
-
-
Byun, J.W.1
Lee, D.H.2
Lim, J.I.3
-
3
-
-
0026122066
-
What every computer scientist should know about floating-point arithmetic
-
Goldberg D., and Priest D. What every computer scientist should know about floating-point arithmetic. ACM Computing Surveys 23 1 (1991) 5-48
-
(1991)
ACM Computing Surveys
, vol.23
, Issue.1
, pp. 5-48
-
-
Goldberg, D.1
Priest, D.2
-
4
-
-
84893107930
-
-
T. Habutsu, Y. Nishio, I. Sasase, S. Mori, A secret key cryptosystem by iteration a chaotic map, in: Proceedings of Eurocrypt'91, Brighton, UK, 1991, pp. 127-140.
-
-
-
-
5
-
-
33847305360
-
Fingerprint images encryption via multi-scroll chaotic attractors
-
Han F., Hu J., Yu X., et al. Fingerprint images encryption via multi-scroll chaotic attractors. Applied Mathematics and Computation 185 (2007) 931-939
-
(2007)
Applied Mathematics and Computation
, vol.185
, pp. 931-939
-
-
Han, F.1
Hu, J.2
Yu, X.3
-
6
-
-
4444346865
-
Chaos-based cryptography: a brief overview
-
Kocarev L. Chaos-based cryptography: a brief overview. IEEE Circuits and Systems Magazine 1 3 (2001) 6-21
-
(2001)
IEEE Circuits and Systems Magazine
, vol.1
, Issue.3
, pp. 6-21
-
-
Kocarev, L.1
-
7
-
-
29644447800
-
A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map
-
Li P., Li Z., Halang W.A., and Chen G. A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map. Physics Letters A 349 (2006) 467-473
-
(2006)
Physics Letters A
, vol.349
, pp. 467-473
-
-
Li, P.1
Li, Z.2
Halang, W.A.3
Chen, G.4
-
8
-
-
29244491993
-
On the dynamical degradation of digital piecewise linear chaotic maps
-
Li S., Chen G., and Mou X. On the dynamical degradation of digital piecewise linear chaotic maps. International Journal of Bifurcation and Chaos 15 10 (2005) 3119-3151
-
(2005)
International Journal of Bifurcation and Chaos
, vol.15
, Issue.10
, pp. 3119-3151
-
-
Li, S.1
Chen, G.2
Mou, X.3
-
9
-
-
34547342744
-
-
S. Lian, Z. Liu, Z. Ren, H. Wang, Hash function based on chaotic neural networks, in: Proceedings of the 2006 International Symposium on Circuits and Systems, 2006, pp. 237-240.
-
-
-
-
10
-
-
33745457862
-
Hashing via finite field
-
Luo W. Hashing via finite field. Information Sciences 176 (2006) 2553-2566
-
(2006)
Information Sciences
, vol.176
, pp. 2553-2566
-
-
Luo, W.1
-
14
-
-
37249008441
-
-
NIST Brief Comments on Recent Cryptanalytic Attacks on Secure Ha-shing Functions and the Continued Security Provided by SHA-1, 2004. http://csrc.nist.gov/hash_standards_comments.pdf.
-
-
-
-
15
-
-
37249003059
-
-
Secure Hash Standard, Federal Information Processing Standards Publication (FIPS PUB) 180-2, 2002.
-
-
-
-
16
-
-
37249037793
-
-
Security Requirements for Cryptographic Modules, Federal Information Processing Standards Publication (FIPS PUB) 140-1, 2002.
-
-
-
-
17
-
-
0001580090
-
Unmasking a modulated chaotic communications scheme
-
Short K.M. Unmasking a modulated chaotic communications scheme. International Journal of Bifurcation and Chaos 6 2 (1996) 367-375
-
(1996)
International Journal of Bifurcation and Chaos
, vol.6
, Issue.2
, pp. 367-375
-
-
Short, K.M.1
-
19
-
-
7244219841
-
Periodicity of chaotic trajectories in realizations of finite computer precisions and its implication in chaos communications
-
Wang S., Liu W., Lu H., et al. Periodicity of chaotic trajectories in realizations of finite computer precisions and its implication in chaos communications. International Journal of Modern Physics B 18 (2005) 2617-2622
-
(2005)
International Journal of Modern Physics B
, vol.18
, pp. 2617-2622
-
-
Wang, S.1
Liu, W.2
Lu, H.3
-
20
-
-
37249013641
-
-
X. Wang, D. Feng, X. Lai, H. Yu, Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD, Rump Session of Crypto'04 E-print, 2004.
-
-
-
-
21
-
-
24944575304
-
-
X. Wang, X. Lai, D. Feng, et al., Cryptanalysis of the Hash functions MD4 and RIPEMD, in: Proceedings of Eurocrypt'05, Aarhus, Denmark, 2005, pp. 1-18.
-
-
-
-
22
-
-
24944591357
-
-
X. Wang, H. Yu, How to break MD5 and other hash functions, in: Proceedings of Eurocrypt'05, Aarhus, Denmark, 2005, pp. 19-35.
-
-
-
-
23
-
-
0008494528
-
Determining Lyapunov exponents from a time series
-
Wolf A., Swift J.B., Harry L., et al. Determining Lyapunov exponents from a time series. Physica D 16 (1985) 285-317
-
(1985)
Physica D
, vol.16
, pp. 285-317
-
-
Wolf, A.1
Swift, J.B.2
Harry, L.3
-
24
-
-
2442684584
-
A combined chaotic cryptographic and hashing scheme
-
Wong K. A combined chaotic cryptographic and hashing scheme. Physics Letters A 307 (2003) 292-298
-
(2003)
Physics Letters A
, vol.307
, pp. 292-298
-
-
Wong, K.1
-
25
-
-
33947101952
-
A novel symmetrical cryptosystem based on discretized two-dimensional chaotic map
-
Xiang T., Wong K., and Liao X. A novel symmetrical cryptosystem based on discretized two-dimensional chaotic map. Physics Letters A 364 (2007) 252-258
-
(2007)
Physics Letters A
, vol.364
, pp. 252-258
-
-
Xiang, T.1
Wong, K.2
Liao, X.3
-
26
-
-
33751227507
-
A novel key agreement protocol based on chaotic maps
-
Xiao D., Liao X., and Deng S. A novel key agreement protocol based on chaotic maps. Information Sciences 177 (2007) 1136-1142
-
(2007)
Information Sciences
, vol.177
, pp. 1136-1142
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
27
-
-
9644303109
-
One-way Hash function construction based on the chaotic map with changeable-parameter
-
Xiao D., Liao X., and Deng S. One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons & Fractals 24 (2005) 65-71
-
(2005)
Chaos Solitons & Fractals
, vol.24
, pp. 65-71
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
28
-
-
22244444503
-
Hash function based on chaotic tent maps
-
Yi X. Hash function based on chaotic tent maps. IEEE Transactions on Circuits and Systems II 52 6 (2005) 354-357
-
(2005)
IEEE Transactions on Circuits and Systems II
, vol.52
, Issue.6
, pp. 354-357
-
-
Yi, X.1
-
29
-
-
24744456105
-
One way Hash function construction based on spatiotemporal chaos
-
(in Chinese)
-
Zhang H., Wang X., Li Z., and Liu D. One way Hash function construction based on spatiotemporal chaos. Acta Physica Sinica 54 9 (2005) 4006-4011 (in Chinese)
-
(2005)
Acta Physica Sinica
, vol.54
, Issue.9
, pp. 4006-4011
-
-
Zhang, H.1
Wang, X.2
Li, Z.3
Liu, D.4
-
30
-
-
33846348219
-
Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
-
Zhang J., Wang X., and Zhang W. Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter. Physics Letters A 362 (2007) 439-448
-
(2007)
Physics Letters A
, vol.362
, pp. 439-448
-
-
Zhang, J.1
Wang, X.2
Zhang, W.3
-
31
-
-
34447330138
-
How to construct secure proxy cryptosystem
-
Zhou Y., Fang B., Cao Z., Yun X., and Cheng X. How to construct secure proxy cryptosystem. Information Sciences 177 (2007) 4095-4108
-
(2007)
Information Sciences
, vol.177
, pp. 4095-4108
-
-
Zhou, Y.1
Fang, B.2
Cao, Z.3
Yun, X.4
Cheng, X.5
|