-
1
-
-
33745387345
-
Cryptography based on delayed chaotic neural networks
-
W. Yu, J. Cao, "Cryptography based on delayed chaotic neural networks," Physics letters A 356, pp. 333-338, 2006.
-
(2006)
Physics letters A
, vol.356
, pp. 333-338
-
-
Yu, W.1
Cao, J.2
-
2
-
-
0035250017
-
Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps
-
Feb
-
G. Jakimoski, L. Kocarev, "Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps," IEEE Trans. On Circuits and Systems-I: Fundamental Theory and Applications, vol. 48, no. 2, pp. 163-169, Feb. 2001.
-
(2001)
IEEE Trans. On Circuits and Systems-I: Fundamental Theory and Applications
, vol.48
, Issue.2
, pp. 163-169
-
-
Jakimoski, G.1
Kocarev, L.2
-
3
-
-
0000966372
-
Logistic Map as a Block Encryption Algorithm
-
L. Kocarev, G. Jakimoski, "Logistic Map as a Block Encryption Algorithm," Physics Letters A 289, pp. 199-206, 2001.
-
(2001)
Physics Letters A
, vol.289
, pp. 199-206
-
-
Kocarev, L.1
Jakimoski, G.2
-
4
-
-
42949093435
-
Pseudo-Random Number Generators and Chaos
-
Chang-Gan University, TAIWAN
-
C.-M. Ou, "Pseudo-Random Number Generators and Chaos," 4th Conference of Computers and Communications, Chang-Gan University, TAIWAN, 1998.
-
(1998)
4th Conference of Computers and Communications
-
-
Ou, C.-M.1
-
5
-
-
0037451060
-
Discrete Chaotic Cryptography using External Key
-
N. Pareek, V. Patidar, K. Sud, "Discrete Chaotic Cryptography using External Key," Physics Letters A 309, pp. 75-82, 2003.
-
(2003)
Physics Letters A
, vol.309
, pp. 75-82
-
-
Pareek, N.1
Patidar, V.2
Sud, K.3
-
6
-
-
42949144710
-
-
M. Svensson, J.-E. Malmquist, A simple Secure Communications System utilizing Chaotic Functions to Control the Encryption and Decryption of Messages, Project report for the course 'Chaos in science and technology', Lund Institute of Technology, Dept. of Physics, subdept. of mathematical physics, 1996.
-
M. Svensson, J.-E. Malmquist, "A simple Secure Communications System utilizing Chaotic Functions to Control the Encryption and Decryption of Messages," Project report for the course 'Chaos in science and technology', Lund Institute of Technology, Dept. of Physics, subdept. of mathematical physics, 1996.
-
-
-
-
7
-
-
84890522850
-
Communication Theory of Security Systems
-
Oct
-
C. Shannon, "Communication Theory of Security Systems," Bell Systems Tech J., vol. 28, Oct. 1949.
-
(1949)
Bell Systems Tech J
, vol.28
-
-
Shannon, C.1
-
8
-
-
0042786512
-
Cryptography with Chaos
-
M. Baptista, "Cryptography with Chaos," Physics Letters A 240, pp. 50-54, 1998.
-
(1998)
Physics Letters A
, vol.240
, pp. 50-54
-
-
Baptista, M.1
-
9
-
-
84893107930
-
A Secret Key Cryptosystem by Iterating a Chaotic Map, Advances in Cryptology, EUROCRYPT'91
-
T. Habutsu, Y. Nishio, I. Sasase, S. Mori, "A Secret Key Cryptosystem by Iterating a Chaotic Map," Advances in Cryptology, EUROCRYPT'91, LNCS 547, pp. 127-140, 1991.
-
(1991)
LNCS
, vol.547
, pp. 127-140
-
-
Habutsu, T.1
Nishio, Y.2
Sasase, I.3
Mori, S.4
-
10
-
-
0038938048
-
Application of discrete Chaotic Dynamical Systems in Cryptography: DCC method
-
Z. Kotulski et al., "Application of discrete Chaotic Dynamical Systems in Cryptography: DCC method," International Journal of Bifurcation and Chaos, vol. 9, no. 6, pp. 1121-1135, 1999.
-
(1999)
International Journal of Bifurcation and Chaos
, vol.9
, Issue.6
, pp. 1121-1135
-
-
Kotulski, Z.1
-
11
-
-
0037053849
-
A fast chaotic cryptographic scheme with dynamic look-up table
-
K. Wong, "A fast chaotic cryptographic scheme with dynamic look-up table," Physics Letter A 298, pp. 238-242, 2002.
-
(2002)
Physics Letter A
, vol.298
, pp. 238-242
-
-
Wong, K.1
-
13
-
-
0003478288
-
-
Springer-Verlag
-
J. Guckenheimer, P. Holmes, Nonlinear Oscillations, Dynamical Systems, and Bifurcations of Vector Fields, Springer-Verlag, 1985.
-
(1985)
Nonlinear Oscillations, Dynamical Systems, and Bifurcations of Vector Fields
-
-
Guckenheimer, J.1
Holmes, P.2
-
14
-
-
0003751471
-
-
Wuhan University Publication, in Chinese
-
G.-H. Liu, G.-A, Lu, S.-H. Chen, Chaotic Time Series, Analysis and Applications, Wuhan University Publication, 2002 (in Chinese).
-
(2002)
Chaotic Time Series, Analysis and Applications
-
-
Liu, G.-H.1
Lu, G.-A.2
Chen, S.-H.3
-
16
-
-
14744280610
-
Cryptographically Secure Substitutions Based on the Approximation of Mixing Maps
-
Feb
-
J. Szczepanski, J. Amigo, T. Michalek, L. Kocarev, " Cryptographically Secure Substitutions Based on the Approximation of Mixing Maps," IEEE Trans. Circuit and Systems-I: Regular Papers, vol., 52, no. 2, pp. 443-453, Feb. 2005.
-
(2005)
IEEE Trans. Circuit and Systems-I: Regular Papers
, vol.52
, Issue.2
, pp. 443-453
-
-
Szczepanski, J.1
Amigo, J.2
Michalek, T.3
Kocarev, L.4
-
17
-
-
0026397734
-
Differential Cryptanalysis of DES-like cryptosystems
-
E. Biham, A. Shamir, "Differential Cryptanalysis of DES-like cryptosystems," J. Cryptology, vol. 4, no. 1, pp. 3-72, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
18
-
-
36248948553
-
Discrete Lyapunov Exponent and Resistance to Differential Cryptanalysis
-
Oct
-
J. Amigo, L. Kocarev, J. Szczepanski, "Discrete Lyapunov Exponent and Resistance to Differential Cryptanalysis," IEEE Trans. Circuit and Systems-II: Express Briefs, vol. 4, no. 10, pp. 882-886, Oct. 2007.
-
(2007)
IEEE Trans. Circuit and Systems-II: Express Briefs
, vol.4
, Issue.10
, pp. 882-886
-
-
Amigo, J.1
Kocarev, L.2
Szczepanski, J.3
|