-
1
-
-
0345831120
-
New approach to chaotic encryption
-
Alvarez, E., Fernandez, A., Garcia, P., Jimenez, J. & Marcano, A. [1999] "New approach to chaotic encryption," Phys. Lett. A 263, 373-375.
-
(1999)
Phys. Lett. A
, vol.263
, pp. 373-375
-
-
Alvarez, E.1
Fernandez, A.2
Garcia, P.3
Jimenez, J.4
Marcano, A.5
-
2
-
-
0034735530
-
Cryptanalysis of a chaotic encryption system
-
Alvarez, G., Montoya, F., Romera, M. & Pastor, G. [2000] "Cryptanalysis of a chaotic encryption system," Phys. Lett. A 276, 191-196.
-
(2000)
Phys. Lett. A
, vol.276
, pp. 191-196
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
3
-
-
0037905070
-
Cryptanalysis of an ergodic chaotic cipher
-
Alvarez, G., Montoya, F., Romera, M. & Pastor, G. [2003] "Cryptanalysis of an ergodic chaotic cipher," Phys. Lett. A 311, 172-179.
-
(2003)
Phys. Lett. A
, vol.311
, pp. 172-179
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
4
-
-
0042786512
-
Cryptography with chaos
-
Baptista, M. S. [1998] "Cryptography with chaos," Phys. Lett. A 240, 50-54.
-
(1998)
Phys. Lett. A
, vol.240
, pp. 50-54
-
-
Baptista, M.S.1
-
5
-
-
85036731255
-
Cryptanalysis of grain using time/ memory/date tradeoffs
-
available online at
-
Bjorstad, T. [2006] "Cryptanalysis of grain using time/ memory/date tradeoffs," eSTREAM, ECRYPT Stream Cipher Project, available online at http://www.ecrypt.eu.org/stream/grainp3.html.
-
(2006)
ESTREAM, ECRYPT Stream Cipher Project
-
-
Bjorstad, T.1
-
6
-
-
84863404596
-
Dragon: A fast word based stream cipher
-
available online at
-
Chen, K., Henricksen, M., Millan, W., Fuller, J., Simpson, L., Dawson, E., Lee, H. & Moon, S. [2005] "Dragon: A fast word based stream cipher," eSTREAM, ECRYPT Stream Cipher Project, available online at http://www.ecrypt.eu.org/stream/ dragonp3.html.
-
(2005)
ESTREAM, ECRYPT Stream Cipher Project
-
-
Chen, K.1
Henricksen, M.2
Millan, W.3
Fuller, J.4
Simpson, L.5
Dawson, E.6
Lee, H.7
Moon, S.8
-
7
-
-
84974670663
-
The shrinking generator
-
Lecture Notes in Computer Science (Springer-Verlag)
-
Coppersmith, D., Krawczyk, H. & Mansour, Y. [1994] "The shrinking generator," Advances in Cryptology: CRYPTO 93, Lecture Notes in Computer Science, Vol.773 (Springer-Verlag), pp. 22-39.
-
(1994)
Advances in Cryptology: CRYPTO 93
, vol.773
, pp. 22-39
-
-
Coppersmith, D.1
Krawczyk, H.2
Mansour, Y.3
-
9
-
-
35248859228
-
Predicting the shrinking generator with fixed connections
-
Lecture Notes in Computer Science, (Springer- Verlag)
-
Ekdahl, P., Johansson, T. & Meier, W. [2003] "Predicting the shrinking generator with fixed connections," Advances in Cryptology: EUROCRYPT 03, Lecture Notes in Computer Science, Vol.2656 (Springer- Verlag), pp. 330-344.
-
(2003)
Advances in Cryptology: EUROCRYPT 03
, vol.2656
, pp. 330-344
-
-
Ekdahl, P.1
Johansson, T.2
Meier, W.3
-
10
-
-
0001816458
-
Quantitative universality for a class of nonlinear transformations
-
Feigenbaum, M. G. [1978] "Quantitative universality for a class of nonlinear transformations," J. Stat. Phys. 19, 25-52.
-
(1978)
J. Stat. Phys.
, vol.19
, pp. 25-52
-
-
Feigenbaum, M.G.1
-
11
-
-
85036744712
-
-
available online at
-
Gilmore, R. [2009] "Logistic map," available online at http://einstein.drexel.edu/?bob/PHYS750 NLD/ ch2.pdf.
-
(2009)
Logistic Map
-
-
Gilmore, R.1
-
12
-
-
84880855404
-
Correlation analysis of the shrinking generator
-
Lecture Notes in Computer Science
-
Golic, J. [2001] "Correlation analysis of the shrinking generator," Advances in Cryptology: CRYPTO 01, Lecture Notes in Computer Science, Vol.2139 (Springer-Verlag), pp. 440-457.
-
(2001)
Advances in Cryptology: CRYPTO 01
, vol.2139
, pp. 440-457
-
-
Golic, J.1
-
13
-
-
26444578164
-
The bit-search generator
-
Brugge, Belgium
-
Gouget, A. & Sibert, H. [2004] "The bit-search generator," The State of the Art of Stream Ciphers: Workshop Record, Brugge, Belgium, pp. 60-68.
-
(2004)
The State of the Art of Stream Ciphers: Workshop Record
, pp. 60-68
-
-
Gouget, A.1
Sibert, H.2
-
14
-
-
84949426591
-
Scream: A software-efficient stream cipher
-
Lecture Notes in Computer Science, (Springer-Verlag)
-
Halevi, S., Coppersmith, D. & Jutla, C. [2002] "Scream: A software-efficient stream cipher," Fast Software Encryption: FSE 02, Lecture Notes in Computer Science, Vol.2365 (Springer-Verlag), pp. 195-209.
-
(2002)
Fast Software Encryption: FSE 02
, vol.2365
, pp. 195-209
-
-
Halevi, S.1
Coppersmith, D.2
Jutla, C.3
-
15
-
-
26444452700
-
Some attacks on the bit-search generator
-
Lecture Notes in Computer Science (Springer-Verlag)
-
Hell, M. & Johansson, T. [2005] "Some attacks on the bit-search generator," Fast Software Encryption: FSE 05, Lecture Notes in Computer Science, Vol.3557 (Springer-Verlag), pp. 215-227.
-
(2005)
Fast Software Encryption: FSE 05
, vol.3557
, pp. 215-227
-
-
Hell, M.1
Johansson, T.2
-
16
-
-
39049129315
-
A stream cipher proposal: Grain-128
-
available online at
-
Hell, M., Johansson, T. & Meier, W. [2006] "A stream cipher proposal: Grain-128," eSTREAM, ECRYPT Stream Cipher Project, available online at http://www.ecrypt.eu.org/stream/grainp3.html.
-
(2006)
ESTREAM, ECRYPT Stream Cipher Project
-
-
Hell, M.1
Johansson, T.2
Meier, W.3
-
17
-
-
0005205415
-
Analysis of some recently proposed chaos-based encryption algorithms
-
Jakimoski G., Kocarev L. [2001] "Analysis of some recently proposed chaos-based encryption algorithms," Phys. Lett. A 291, 381-384.
-
(2001)
Phys. Lett. A
, vol.291
, pp. 381-384
-
-
Jakimoski, G.1
Kocarev, L.2
-
20
-
-
69249152191
-
Irregularly decimated chaotic map(s) for binary digits generations
-
Kanso, A. & Smaoui, N. [2009] "Irregularly decimated chaotic map(s) for binary digits generations," Int. J. Bifurcation and Chaos 19, 1169-1183.
-
(2009)
Int. J. Bifurcation and Chaos
, vol.19
, pp. 1169-1183
-
-
Kanso, A.1
Smaoui, N.2
-
21
-
-
0000966372
-
Logistic map as a block encryption algorithm
-
Kocarev, L. & Jakimoski, G. [2001] "Logistic map as a block encryption algorithm," Phys. Lett. A 289, 199-206.
-
(2001)
Phys. Lett. A
, vol.289
, pp. 199-206
-
-
Kocarev, L.1
Jakimoski, G.2
-
22
-
-
84974731225
-
Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography
-
Lecture Notes in Computer Science, (Springer- Verlag)
-
Li, S., Mou, X. & Cai, Y. [2001a] "Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography," Advances in Cryptology: INDOCRYPT 01, Lecture Notes in Computer Science, Vol.2247 (Springer- Verlag), pp. 316-329.
-
(2001)
Advances in Cryptology: INDOCRYPT 01
, vol.2247
, pp. 316-329
-
-
Li, S.1
Mou, X.2
Cai, Y.3
-
23
-
-
18244420943
-
Improving security of a chaotic encryption approach
-
Li, S., Mou, X. & Cai, Y. [2001b] "Improving security of a chaotic encryption approach," Phys. Lett. A 290, 127-133.
-
(2001)
Phys. Lett. A
, vol.290
, pp. 127-133
-
-
Li, S.1
Mou, X.2
Cai, Y.3
-
24
-
-
84950900200
-
On the derivation of a chaotic encryption algorithm
-
Matthews, R. [1989] "On the derivation of a chaotic encryption algorithm," Cryptologia XIII, 29-42.
-
(1989)
Cryptologia
, vol.13
, pp. 29-42
-
-
Matthews, R.1
-
25
-
-
84859054985
-
Cryptanalysis of RC4- like ciphers
-
Lecture Notes in Computer Science, (Springer-Verlag)
-
Mister, S. & Tavares, S. [1999] "Cryptanalysis of RC4- like ciphers," Selected Areas in Cryptography: SAC 99, Lecture Notes in Computer Science, Vol.1556 (Springer-Verlag), pp. 131-143.
-
(1999)
Selected Areas in Cryptography: SAC 99
, vol.1556
, pp. 131-143
-
-
Mister, S.1
Tavares, S.2
-
27
-
-
35949008275
-
Roundoffinduced periodicity and the correlation dimension of chaotic attractors
-
Ott, E., Grebogi, C. & Yorke, J. A. [1988] "Roundoffinduced periodicity and the correlation dimension of chaotic attractors," Phys. Rev. A 38, 3688-3692.
-
(1988)
Phys. Rev. A
, vol.38
, pp. 3688-3692
-
-
Ott, E.1
Grebogi, C.2
Yorke, J.A.3
-
29
-
-
84890522850
-
Communication theory of secrecy system
-
Shannon, C. E. [1949] "Communication theory of secrecy system," Bell Syst. Tech. J. 28, 656-715.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
30
-
-
84950879089
-
Problems with chaotic cryptosystems
-
Wheeler, D. [1989] "Problems with chaotic cryptosystems," Cryptologia XIII, 243-250.
-
(1989)
Cryptologia
, vol.13
, pp. 243-250
-
-
Wheeler, D.1
-
31
-
-
84950905409
-
Supercomputer investigations of a chaotic encryption algorithm
-
Wheeler, D. & Matthews, R. [1991] "Supercomputer investigations of a chaotic encryption algorithm," Cryptologia XV, 140-151.
-
(1991)
Cryptologia
, vol.15
, pp. 140-151
-
-
Wheeler, D.1
Matthews, R.2
-
32
-
-
1842842992
-
Parameter estimation only from the symbolic sequences generated by chaos system
-
Wu, X., Hu, H. & Zhang, B. [2004] "Parameter estimation only from the symbolic sequences generated by chaos system," Chaos Solit. Fract. 22, 359-366.
-
(2004)
Chaos Solit. Fract.
, vol.22
, pp. 359-366
-
-
Wu, X.1
Hu, H.2
Zhang, B.3
-
33
-
-
0030635241
-
Generating chaotic secure sequences with desired statistical properties and high security
-
Zhou, H. & Ling, X. T. [1997] "Generating chaotic secure sequences with desired statistical properties and high security," Int. J. Bifurcation and Chaos 7, 205-213.
-
(1997)
Int. J. Bifurcation and Chaos
, vol.7
, pp. 205-213
-
-
Zhou, H.1
Ling, X.T.2
|