-
1
-
-
0347909351
-
Contemporary cryptology: an introduction
-
Simmons G.J. (Ed), IEEE Press, New York
-
Massey J.L. Contemporary cryptology: an introduction. In: Simmons G.J. (Ed). Contemporary cryptology (1992), IEEE Press, New York
-
(1992)
Contemporary cryptology
-
-
Massey, J.L.1
-
3
-
-
0343689904
-
Synchronization in chaotic systems
-
Pecora L.M., and Carroll T.L. Synchronization in chaotic systems. Phys Rev Lett 64 (1990) 821-824
-
(1990)
Phys Rev Lett
, vol.64
, pp. 821-824
-
-
Pecora, L.M.1
Carroll, T.L.2
-
4
-
-
0042786512
-
Cryptography with chaos
-
Baptista M.S. Cryptography with chaos. Phys Lett A 240 (1998) 50-54
-
(1998)
Phys Lett A
, vol.240
, pp. 50-54
-
-
Baptista, M.S.1
-
5
-
-
0032089417
-
Symmetric ciphers based on two-dimensional chaotic maps
-
Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8 6 (1998) 1259-1284
-
(1998)
Int J Bifurcat Chaos
, vol.8
, Issue.6
, pp. 1259-1284
-
-
Fridrich, J.1
-
8
-
-
33846348219
-
Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
-
Zhang J., Wang X., and Zhang W. Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter. Phys Lett A 362 (2007) 439-448
-
(2007)
Phys Lett A
, vol.362
, pp. 439-448
-
-
Zhang, J.1
Wang, X.2
Zhang, W.3
-
9
-
-
43949115190
-
Chaotic cryptographic scheme based on composition maps
-
Behnia S., Akhshani A., Mahmodi H., and Akhavan A. Chaotic cryptographic scheme based on composition maps. Int J Bifurcat Chaos 18 1 (2008) 251-261
-
(2008)
Int J Bifurcat Chaos
, vol.18
, Issue.1
, pp. 251-261
-
-
Behnia, S.1
Akhshani, A.2
Mahmodi, H.3
Akhavan, A.4
-
10
-
-
2442684584
-
A combined chaotic cryptographic and hashing scheme
-
Wong K.-W. A combined chaotic cryptographic and hashing scheme. Phys Lett A 307 (2003) 292-298
-
(2003)
Phys Lett A
, vol.307
, pp. 292-298
-
-
Wong, K.-W.1
-
11
-
-
85126456196
-
-
Xiao D., Xiaofeng L., and Deng S. One-way hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons & Fractals 24 (2005) 65-71
-
Xiao D., Xiaofeng L., and Deng S. One-way hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons & Fractals 24 (2005) 65-71
-
-
-
-
12
-
-
64549138387
-
Cryptography based on chaotic random maps with position dependent weighting probabilities
-
in press. doi:10.1016/j.chaos.2007.07.070
-
Behnia S, Akhshani A, Ahadpour S, Akhavan A, Mahmodi H. Cryptography based on chaotic random maps with position dependent weighting probabilities. Chaos, Solitons & Fractals, in press. doi:10.1016/j.chaos.2007.07.070.
-
Chaos, Solitons & Fractals
-
-
Behnia, S.1
Akhshani, A.2
Ahadpour, S.3
Akhavan, A.4
Mahmodi, H.5
-
14
-
-
64549097566
-
Applications of tripled chaotic maps in cryptography
-
in press. doi:10.1016/j.chaos.2007.08.013
-
Behnia S, Akhshani A, Ahadpour S, Akhavan A, Mahmodi H. Applications of tripled chaotic maps in cryptography. Chaos, Solitons and Fractals, in press. doi:10.1016/j.chaos.2007.08.013.
-
Chaos, Solitons and Fractals
-
-
Behnia, S.1
Akhshani, A.2
Ahadpour, S.3
Akhavan, A.4
Mahmodi, H.5
-
15
-
-
1342306864
-
A symmetric image encryption scheme based on 3d chaotic cat maps
-
Chen G., Mao Y.B., and Chui C.K. A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons & Fractals 21 (2004) 749-761
-
(2004)
Chaos Solitons and Fractals
, vol.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.B.2
Chui, C.K.3
-
16
-
-
0005205415
-
Analysis of some recently proposed chaos-based encryption algorithms
-
Jakimoski G., and Kocarev L. Analysis of some recently proposed chaos-based encryption algorithms. Phys Lett A 291 (2001) 381-384
-
(2001)
Phys Lett A
, vol.291
, pp. 381-384
-
-
Jakimoski, G.1
Kocarev, L.2
-
17
-
-
17644411093
-
Security problems with a chaos-based deniable authentication scheme
-
Alvarez G. Security problems with a chaos-based deniable authentication scheme. Chaos, Solitons & Fractals 26 (2005) 7-11
-
(2005)
Chaos, Solitons & Fractals
, vol.26
, pp. 7-11
-
-
Alvarez, G.1
-
18
-
-
4444346865
-
Chaos-based cryptography: a brief overview
-
Kocarev L. Chaos-based cryptography: a brief overview. IEEE Circ Syst 1 (2001) 6-21
-
(2001)
IEEE Circ Syst
, vol.1
, pp. 6-21
-
-
Kocarev, L.1
-
19
-
-
4243740024
-
Extracting messages masked by chaotic signals of time-delay systems
-
Zhou C., and Lai C.H. Extracting messages masked by chaotic signals of time-delay systems. Phys Rev E 60 (1999) 320-323
-
(1999)
Phys Rev E
, vol.60
, pp. 320-323
-
-
Zhou, C.1
Lai, C.H.2
-
21
-
-
41349113980
-
Extracting information masked by the chaotic signal of a time-delay system
-
Ponomarenko C.V.I., and Prokhorov M.D. Extracting information masked by the chaotic signal of a time-delay system. Phys Rev E 66 (2002) 026215-026221
-
(2002)
Phys Rev E
, vol.66
, pp. 026215-026221
-
-
Ponomarenko, C.V.I.1
Prokhorov, M.D.2
-
22
-
-
0035332223
-
Reconstructing the keystream from a chaotic encryption scheme
-
Parker A.T., and Short K.M. Reconstructing the keystream from a chaotic encryption scheme. IEEE Trans Circuits Syst I 48 5 (2001) 624-630
-
(2001)
IEEE Trans Circuits Syst I
, vol.48
, Issue.5
, pp. 624-630
-
-
Parker, A.T.1
Short, K.M.2
-
23
-
-
0001161152
-
Unmasking a hyperchaotic communication scheme
-
Short K.M., and Parker A.T. Unmasking a hyperchaotic communication scheme. Phys Rev E 58 1 (1998) 1159-1162
-
(1998)
Phys Rev E
, vol.58
, Issue.1
, pp. 1159-1162
-
-
Short, K.M.1
Parker, A.T.2
-
24
-
-
22244444503
-
Hash function based on chaotic tent maps
-
Yi X. Hash function based on chaotic tent maps. IEEE Trans Circuits Syst II 52 6 (2005) 354-357
-
(2005)
IEEE Trans Circuits Syst II
, vol.52
, Issue.6
, pp. 354-357
-
-
Yi, X.1
-
25
-
-
0011285982
-
Design of one-dimensional chaotic maps with prescribed statistical properties
-
Baranovsky A., and Daems D. Design of one-dimensional chaotic maps with prescribed statistical properties. Int J Bifurcat Chaos 5 (1995) 1585-1598
-
(1995)
Int J Bifurcat Chaos
, vol.5
, pp. 1585-1598
-
-
Baranovsky, A.1
Daems, D.2
-
26
-
-
0038285043
-
On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision
-
Li S., Mou X., Cai Y., Ji Z., and Zhang J. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Comput Phys Commun 153 (2003) 52-58
-
(2003)
Comput Phys Commun
, vol.153
, pp. 52-58
-
-
Li, S.1
Mou, X.2
Cai, Y.3
Ji, Z.4
Zhang, J.5
-
27
-
-
34249064674
-
A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps
-
Behnia S., Akhshani A., Ahadpour S., Mahmodi H., and Akhavan A. A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys Lett A 366 (2007) 391-396
-
(2007)
Phys Lett A
, vol.366
, pp. 391-396
-
-
Behnia, S.1
Akhshani, A.2
Ahadpour, S.3
Mahmodi, H.4
Akhavan, A.5
-
28
-
-
0035457257
-
Hierarchy of chaotic maps with an invariant measure
-
Jafarizadeh M.A., Behnia S., Khorram S., and Nagshara H. Hierarchy of chaotic maps with an invariant measure. J Stat Phys 104 516 (2001) 1013-1028
-
(2001)
J Stat Phys
, vol.104
, Issue.516
, pp. 1013-1028
-
-
Jafarizadeh, M.A.1
Behnia, S.2
Khorram, S.3
Nagshara, H.4
-
30
-
-
33845255587
-
A new image encryption algorithm based on one-dimensional polynomial chaotic maps
-
Akhavan A., Mahmodi H., and Akhshani A. A new image encryption algorithm based on one-dimensional polynomial chaotic maps. LNCS 4263 (2006) 963-971
-
(2006)
LNCS
, vol.4263
, pp. 963-971
-
-
Akhavan, A.1
Mahmodi, H.2
Akhshani, A.3
-
31
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon C.E. Communication theory of secrecy systems. Bell Syst Tech J 28 (1949) 656-715
-
(1949)
Bell Syst Tech J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
32
-
-
37249092682
-
One-way hash function construction based on 2D coupled map lattices
-
Wang Y., Liao X., Xiao D., and Wong K.-W. One-way hash function construction based on 2D coupled map lattices. Inform Sci 178 (2008) 1391-1406
-
(2008)
Inform Sci
, vol.178
, pp. 1391-1406
-
-
Wang, Y.1
Liao, X.2
Xiao, D.3
Wong, K.-W.4
-
34
-
-
0026122066
-
What every computer scientist should know about floating-point arithmetic
-
Goldberg D., and Priest D. What every computer scientist should know about floating-point arithmetic. ACM Comput Surv 23 1 (1991) 5-48
-
(1991)
ACM Comput Surv
, vol.23
, Issue.1
, pp. 5-48
-
-
Goldberg, D.1
Priest, D.2
|