-
1
-
-
0343689904
-
Synchronization in chaotic systems
-
L. M. Pecora and T. L. Carroll, "Synchronization in chaotic systems", Phys. Rev. Lett., 1990, vol. 64, no. 8, pp. 821-824.
-
(1990)
Phys. Rev. Lett
, vol.64
, Issue.8
, pp. 821-824
-
-
Pecora, L.M.1
Carroll, T.L.2
-
2
-
-
0000864537
-
Synchronization of spatiotemporal chaos and its application to multichannel spread-spectrum Communication
-
J. H. Xiao, G. Hu, and Z. L. Qu, "Synchronization of spatiotemporal chaos and its application to multichannel spread-spectrum Communication", Phys. Rev. Lett., 1996, vol. 77, no. 20, pp. 4162-4165.
-
(1996)
Phys. Rev. Lett
, vol.77
, Issue.20
, pp. 4162-4165
-
-
Xiao, J.H.1
Hu, G.2
Qu, Z.L.3
-
3
-
-
0001177874
-
Synchronizing hyperchaos with a scalar transmitted signal
-
J. H. Peng, E. J. Ding, M. Ding, and W. Yang, "Synchronizing hyperchaos with a scalar transmitted signal", Phys. Rev. Lett., 1996, vol. 76, no. 6, pp. 904-907.
-
(1996)
Phys. Rev. Lett
, vol.76
, Issue.6
, pp. 904-907
-
-
Peng, J.H.1
Ding, E.J.2
Ding, M.3
Yang, W.4
-
4
-
-
0036505160
-
Generalized state-space observers for chaotic synchronization and secure communication
-
M. Boutayeb, M. Darouach, and H. Rafaralahy, "Generalized state-space observers for chaotic synchronization and secure communication", IEEE Trans. on CAS-I, 2002, vol. 49, no. 3, pp. 345-349.
-
(2002)
IEEE Trans. on CAS-I
, vol.49
, Issue.3
, pp. 345-349
-
-
Boutayeb, M.1
Darouach, M.2
Rafaralahy, H.3
-
5
-
-
0031139753
-
Cryptography based on chaotic systems
-
T. Yang, C. W. Wu, and L. O. Chua, "Cryptography based on chaotic systems", IEEE Trans. on CAS-I. 1997, vol. 44, no. 5, pp. 469-472.
-
(1997)
IEEE Trans. on CAS-I
, vol.44
, Issue.5
, pp. 469-472
-
-
Yang, T.1
Wu, C.W.2
Chua, L.O.3
-
6
-
-
0031351370
-
Image encryption based on chaotic maps
-
Man, and Cybernetics
-
J. Fridrich, "Image encryption based on chaotic maps", Proc. IEEE Int. Conf. Systems, Man, and Cybernetics, 1997, vol. 2, pp. 1105-1110.
-
(1997)
Proc. IEEE Int. Conf. Systems
, vol.2
, pp. 1105-1110
-
-
Fridrich, J.1
-
7
-
-
0000966372
-
Logistic map as a block encryption algorithm
-
L. Kocarev and G. Jakimoski, "Logistic map as a block encryption algorithm", Phys. Lett. A, 2001, vol. 289, no. 4-5, pp. 199-206.
-
(2001)
Phys. Lett. A
, vol.289
, Issue.4-5
, pp. 199-206
-
-
Kocarev, L.1
Jakimoski, G.2
-
8
-
-
1342306864
-
A symmetric image encryption based on 3D chaotic maps
-
G. Chen, Y. Mao, and C. K. Chui, "A symmetric image encryption based on 3D chaotic maps", Chaos, Solitons & Fractals, 2004, vol. 21, no. 3, pp. 749-761.
-
(2004)
Chaos, Solitons & Fractals
, vol.21
, Issue.3
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.K.3
-
9
-
-
0000861888
-
Chaotic mixing of digital images and applications to watermarking
-
G. Voyatzis and I. Pitas, "Chaotic mixing of digital images and applications to watermarking", Proceedings of ECMAST'96, 1996, vol. 2, pp. 687-694.
-
(1996)
Proceedings of ECMAST'96
, vol.2
, pp. 687-694
-
-
Voyatzis, G.1
Pitas, I.2
-
10
-
-
27744517664
-
Ergodic chaotic parameter modulation with application to digital image watermarking
-
S. Y. Chen and H. Leung, "Ergodic chaotic parameter modulation with application to digital image watermarking", IEEE Trans. on Image Processing, 2005, vol. 14, no. 10, pp. 1590-1602.
-
(2005)
IEEE Trans. on Image Processing
, vol.14
, Issue.10
, pp. 1590-1602
-
-
Chen, S.Y.1
Leung, H.2
-
11
-
-
1842528982
-
A chaos-based robust wavelet-domain watermarking algorithm
-
D. W. Zhao, G. R. Chen, and W. B. Liu, "A chaos-based robust wavelet-domain watermarking algorithm", Chaos, Solitons & Fractals, 2004, vol. 22, no. 1, pp. 47-54.
-
(2004)
Chaos, Solitons & Fractals
, vol.22
, Issue.1
, pp. 47-54
-
-
Zhao, D.W.1
Chen, G.R.2
Liu, W.B.3
-
12
-
-
33751227507
-
A novel key agreement protocol based on chaotic maps
-
D. Xiao, X. F. Liao, and S. J. Deng, "A novel key agreement protocol based on chaotic maps", Information Sciences, 2007, vol. 177, no. 4, pp. 1136-1142.
-
(2007)
Information Sciences
, vol.177
, Issue.4
, pp. 1136-1142
-
-
Xiao, D.1
Liao, X.F.2
Deng, S.J.3
-
13
-
-
43049150816
-
Security of a key agreement protocol based on chaotic maps
-
In Press, doi:10.1016/j.chaos.2007.01.017
-
S. Han, "Security of a key agreement protocol based on chaotic maps", Chaos, Solitons & Fractals, In Press, 2007, doi:10.1016/j.chaos.2007.01.017.
-
(2007)
Chaos, Solitons & Fractals
-
-
Han, S.1
-
14
-
-
2442684584
-
A combined chaotic cryptographic and hashing scheme
-
K. W. Wong, "A combined chaotic cryptographic and hashing scheme", Phys. Lett. A, 2003, vol. 307, no. 5-6, pp. 292-298.
-
(2003)
Phys. Lett. A
, vol.307
, Issue.5-6
, pp. 292-298
-
-
Wong, K.W.1
-
15
-
-
2442662577
-
Cryptanalysis of dynamic look-up table based chaotic cryptosystems
-
G. Alvarez, F. Montoya, M. Romera, and G. Pastor, "Cryptanalysis of dynamic look-up table based chaotic cryptosystems", Phys. Lett. A, 2004, vol. 326, no. 3-4, pp. 211-218.
-
(2004)
Phys. Lett. A
, vol.326
, Issue.3-4
, pp. 211-218
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
16
-
-
9644303109
-
One-way hash function construction based on the chaotic map with changeable-parameter
-
D. Xiao, X. F. Liao, and S. J. Deng, "One-way hash function construction based on the chaotic map with changeable-parameter", Chaos, Solitons & Fractals, 2005, vol. 24, no. 1, pp. 65-71.
-
(2005)
Chaos, Solitons & Fractals
, vol.24
, Issue.1
, pp. 65-71
-
-
Xiao, D.1
Liao, X.F.2
Deng, S.J.3
-
17
-
-
22244444503
-
Hash function based on chaotic tent maps
-
X. Yi, "Hash function based on chaotic tent maps", IEEE Trans. on CAS-II, 2005, vol. 52, no. 6, pp. 354-357.
-
(2005)
IEEE Trans. on CAS-II
, vol.52
, Issue.6
, pp. 354-357
-
-
Yi, X.1
-
18
-
-
34547342744
-
Hash function based on chaotic neural networks
-
S. G. Lian, Z. G. Liu, Z. Ren, and H. L. Wang, "Hash function based on chaotic neural networks", Proceedings of IEEE International Symposium on Circuits and Systems, 2006, pp. 237-240.
-
(2006)
Proceedings of IEEE International Symposium on Circuits and Systems
, pp. 237-240
-
-
Lian, S.G.1
Liu, Z.G.2
Ren, Z.3
Wang, H.L.4
-
19
-
-
33846348219
-
Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
-
J. S. Zhang, X. M. Wang, and W. F. Zhang, "Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter", Phys. Lett. A, 2007, vol. 362, no. 5-6, pp. 439-448.
-
(2007)
Phys. Lett. A
, vol.362
, Issue.5-6
, pp. 439-448
-
-
Zhang, J.S.1
Wang, X.M.2
Zhang, W.F.3
-
20
-
-
19944425657
-
Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD
-
E-print
-
X. Y. Wang, D. G. Feng, X. J. Lai, and H. B. Yu, "Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD", Crypto'04, 2004, E-print.
-
(2004)
Crypto'04
-
-
Wang, X.Y.1
Feng, D.G.2
Lai, X.J.3
Yu, H.B.4
-
21
-
-
0027650105
-
Pseudonoise sequences by chaotic nonlinear and their correlation properties
-
T. Kohda and A. Tsuneda, "Pseudonoise sequences by chaotic nonlinear and their correlation properties", IEICE Trans. on Communications, 1993, vol. E76-B, no. 8, pp. 855-862.
-
(1993)
IEICE Trans. on Communications
, vol.E76-B
, Issue.8
, pp. 855-862
-
-
Kohda, T.1
Tsuneda, A.2
-
22
-
-
0030833521
-
Statistics of chaotic binary sequences
-
T. Kohda and A. Tsuneda, "Statistics of chaotic binary sequences", IEEE Trans. on Information Theory, 1997, vol. 43, no. 1, pp. 104-112.
-
(1997)
IEEE Trans. on Information Theory
, vol.43
, Issue.1
, pp. 104-112
-
-
Kohda, T.1
Tsuneda, A.2
-
23
-
-
84966243898
-
Ergodic and mixing properties of Chebyshev polynomials
-
R. L. Adler and T. J. Rivlin, "Ergodic and mixing properties of Chebyshev polynomials", Proceedings of the American Mathematical Society, 1964, vol. 15, no. 5, pp. 794-796.
-
(1964)
Proceedings of the American Mathematical Society
, vol.15
, Issue.5
, pp. 794-796
-
-
Adler, R.L.1
Rivlin, T.J.2
-
24
-
-
29244491993
-
On the dynamical degradation of digital piecewise linear chaotic maps
-
S. J. Li, G. R. Chen, and X. Q. Mou, "On the dynamical degradation of digital piecewise linear chaotic maps", Int. Journal of Bifurcation and Chaos, 2005, vol. 15, no. 10, pp. 3119-3151.
-
(2005)
Int. Journal of Bifurcation and Chaos
, vol.15
, Issue.10
, pp. 3119-3151
-
-
Li, S.J.1
Chen, G.R.2
Mou, X.Q.3
-
25
-
-
56349145831
-
-
S. Lucks, Design principles for iterated hash functions, Cryptology ePrint Archive: Report, 2004/253.
-
S. Lucks, "Design principles for iterated hash functions", Cryptology ePrint Archive: Report, 2004/253.
-
-
-
-
26
-
-
84937461306
-
One way hash functions and DES
-
Proceedings of Advances in Cryptology-CRYPTO'89, Springer-Verlag
-
R. C. Merkle, "One way hash functions and DES", Proceedings of Advances in Cryptology-CRYPTO'89, LNCS 435, pp. 428-446, Springer-Verlag, 1990.
-
(1990)
LNCS
, vol.435
, pp. 428-446
-
-
Merkle, R.C.1
-
27
-
-
84890522850
-
Communication theory of secrecy system
-
C. E. Shannon, "Communication theory of secrecy system", The Bell System Technical Journal, 1949, vol. 28, no. 4, pp. 656-715.
-
(1949)
The Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
28
-
-
0003855464
-
-
Second Edition, John Wiley & Sons Press
-
B. Schneier, Applied Cryptography (Second Edition), John Wiley & Sons Press, 1996.
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
|