-
1
-
-
85196221156
-
-
Habutsu T, Nishio Y. A secret key cryptosystem by iterating a chaotic map. In: Advances in cryptology-EuroCrypt_91. Lecture notes in computer science 0547, Spinger, Berlin; 1991. p. 127-40.
-
Habutsu T, Nishio Y. A secret key cryptosystem by iterating a chaotic map. In: Advances in cryptology-EuroCrypt_91. Lecture notes in computer science 0547, Spinger, Berlin; 1991. p. 127-40.
-
-
-
-
2
-
-
0036123125
-
Cryptosystems with discretized chaotic maps
-
Masuda N., and Aihara N. Cryptosystems with discretized chaotic maps. IEEE Trans Circ Syst-I 49 1 (2002) 28-40
-
(2002)
IEEE Trans Circ Syst-I
, vol.49
, Issue.1
, pp. 28-40
-
-
Masuda, N.1
Aihara, N.2
-
3
-
-
37249092682
-
One-way hash function construction based on 2D coupled map lattices
-
Wang Y., Liao X., Xiao D., and Wong K.W. One-way hash function construction based on 2D coupled map lattices. Inform Sci 178 (2008) 1391-1406
-
(2008)
Inform Sci
, Issue.178
, pp. 1391-1406
-
-
Wang, Y.1
Liao, X.2
Xiao, D.3
Wong, K.W.4
-
4
-
-
34547285788
-
Selective image encryption using a spatiotemporal chaotic system
-
Xiang T., Wong K.W., and Liao X. Selective image encryption using a spatiotemporal chaotic system. Chaos 17 (2007) 0231151-02311512
-
(2007)
Chaos
, Issue.17
, pp. 0231151-02311512
-
-
Xiang, T.1
Wong, K.W.2
Liao, X.3
-
5
-
-
36048937251
-
Optical image encryption using fractional fourier transform and chaos
-
Singh N., and Sinha A. Optical image encryption using fractional fourier transform and chaos. Opt Laser Eng 46 (2008) 117-123
-
(2008)
Opt Laser Eng
, Issue.46
, pp. 117-123
-
-
Singh, N.1
Sinha, A.2
-
6
-
-
40849137988
-
A fast image encryption scheme based on chaotic standard map
-
Wong K.W., Kwok B.S., and Law W.S. A fast image encryption scheme based on chaotic standard map. Phys Lett A 372 (2008) 2645-2652
-
(2008)
Phys Lett A
, Issue.372
, pp. 2645-2652
-
-
Wong, K.W.1
Kwok, B.S.2
Law, W.S.3
-
7
-
-
35248850363
-
Encryption and decryption of information in chaotic communication systems governed by delay-differential equations
-
Prokhorov M.D., and Ponomarenko V.I. Encryption and decryption of information in chaotic communication systems governed by delay-differential equations. Chaos Solitons Fract 35 (2008) 871-877
-
(2008)
Chaos Solitons Fract
, Issue.35
, pp. 871-877
-
-
Prokhorov, M.D.1
Ponomarenko, V.I.2
-
9
-
-
34250692682
-
Confidential communication through chaos encryption in wireless sensor network
-
Chen S., and Zhong X. Confidential communication through chaos encryption in wireless sensor network. J China Univ Mining Technol 17 (2007) 258-261
-
(2007)
J China Univ Mining Technol
, Issue.17
, pp. 258-261
-
-
Chen, S.1
Zhong, X.2
-
10
-
-
4243129231
-
A novel method for designing S-boxes based on chaotic maps
-
Tang G., Liao X., and Chen Y. A novel method for designing S-boxes based on chaotic maps. Chaos Solitons Fract 23 (2005) 413-419
-
(2005)
Chaos Solitons Fract
, vol.23
, pp. 413-419
-
-
Tang, G.1
Liao, X.2
Chen, Y.3
-
11
-
-
1342317751
-
Chaos and cryptography: block encryption ciphers
-
Jakimoski G., and Kocarev L. Chaos and cryptography: block encryption ciphers. IEEE Trans Circuits Syst-I 48 2 (2001) 163-170
-
(2001)
IEEE Trans Circuits Syst-I
, vol.48
, Issue.2
, pp. 163-170
-
-
Jakimoski, G.1
Kocarev, L.2
-
12
-
-
33747348397
-
An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
-
Chen G., Chen Y., and Liao X. An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps. Chaos Solitons Fract 31 3 (2007) 571-579
-
(2007)
Chaos Solitons Fract
, vol.31
, Issue.3
, pp. 571-579
-
-
Chen, G.1
Chen, Y.2
Liao, X.3
-
13
-
-
9544225075
-
A method for designing dynamical S-boxes based on discretized chaotic map
-
Tang G., and Liao X. A method for designing dynamical S-boxes based on discretized chaotic map. Chaos Solitons Fract 23 5 (2005) 1901-1909
-
(2005)
Chaos Solitons Fract
, vol.23
, Issue.5
, pp. 1901-1909
-
-
Tang, G.1
Liao, X.2
-
15
-
-
0003589319
-
IEEE standard for binary floating-point arithmetic
-
IEEE Computer Society, August
-
IEEE Computer Society, IEEE standard for binary floating-point arithmetic, ANSI/IEEE Std. 754-1985; August 1985.
-
(1985)
ANSI/IEEE Std
, vol.754
-
-
-
16
-
-
85032878553
-
Good S-boxes are easy to find
-
Advances in cryptology: proceedings of the CRYPTO_89
-
Adamas C, Tavares S. Good S-boxes are easy to find. In: Advances in cryptology: proceedings of the CRYPTO_89. Lecture notes in computer science; 1989. p. 612-15.
-
(1989)
Lecture notes in computer science
, pp. 612-615
-
-
Adamas, C.1
Tavares, S.2
-
19
-
-
0026397734
-
Differential cryptanalysis of DES-like cryptosystems
-
Biham E., and Shamir A. Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4 1 (1991) 3-72
-
(1991)
J Cryptol
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
20
-
-
84890522850
-
Communication theory of secrecy system
-
Shannon C.E. Communication theory of secrecy system. Bell Syst Tech J 28 (1949) 656-715
-
(1949)
Bell Syst Tech J
, Issue.28
, pp. 656-715
-
-
Shannon, C.E.1
-
21
-
-
33846348219
-
Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
-
Zhang J., Wang X., and Zhang W. Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter. Phys Lett A 362 (2007) 439-448
-
(2007)
Phys Lett A
, vol.362
, pp. 439-448
-
-
Zhang, J.1
Wang, X.2
Zhang, W.3
-
22
-
-
0026122066
-
What every computer scientist should know about floating-point arithmetic?
-
Goldberg D., and Priest D. What every computer scientist should know about floating-point arithmetic?. ACM Comput Survey 23 1 (1991) 5-48
-
(1991)
ACM Comput Survey
, vol.23
, Issue.1
, pp. 5-48
-
-
Goldberg, D.1
Priest, D.2
|