메뉴 건너뛰기




Volumn 19, Issue 12, 2009, Pages 4227-4235

Search-based chaotic pseudorandom bit generator

Author keywords

Chaos; Cryptography; Quadratic map; Stream ciphers

Indexed keywords

CHAOS THEORY; CHAOTIC SYSTEMS; RANDOM PROCESSES;

EID: 77950352173     PISSN: 02181274     EISSN: None     Source Type: Journal    
DOI: 10.1142/S0218127409025316     Document Type: Article
Times cited : (6)

References (33)
  • 2
    • 0034735530 scopus 로고    scopus 로고
    • Cryptanalysis of a chaotic encryption system
    • Alvarez, G., Montoya, F., Romera, M. & Pastor, G. [2000] "Cryptanalysis of a chaotic encryption system," Phys. Lett. A 276, 191-196.
    • (2000) Phys. Lett. A , vol.276 , pp. 191-196
    • Alvarez, G.1    Montoya, F.2    Romera, M.3    Pastor, G.4
  • 4
    • 0042786512 scopus 로고    scopus 로고
    • Cryptography with chaos
    • Baptista, M. S. [1998] "Cryptography with chaos," Phys. Lett. A 240, 50-54.
    • (1998) Phys. Lett. A , vol.240 , pp. 50-54
    • Baptista, M.S.1
  • 5
    • 85036731255 scopus 로고    scopus 로고
    • Cryptanalysis of grain using time/ memory/date tradeoffs
    • available online at
    • Bjorstad, T. [2006] "Cryptanalysis of grain using time/ memory/date tradeoffs," eSTREAM, ECRYPT Stream Cipher Project, available online at http://www.ecrypt.eu.org/stream/grainp3.html.
    • (2006) ESTREAM, ECRYPT Stream Cipher Project
    • Bjorstad, T.1
  • 7
    • 84974670663 scopus 로고
    • The shrinking generator
    • Lecture Notes in Computer Science (Springer-Verlag)
    • Coppersmith, D., Krawczyk, H. & Mansour, Y. [1994] "The shrinking generator," Advances in Cryptology: CRYPTO 93, Lecture Notes in Computer Science, Vol.773 (Springer-Verlag), pp. 22-39.
    • (1994) Advances in Cryptology: CRYPTO 93 , vol.773 , pp. 22-39
    • Coppersmith, D.1    Krawczyk, H.2    Mansour, Y.3
  • 8
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Diffie, W. & Hellman, M. [1976] "New directions in cryptography," IEEE Trans. Inform. Th. IT-22, 644-654.
    • (1976) IEEE Trans. Inform. Th. , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 9
    • 35248859228 scopus 로고    scopus 로고
    • Predicting the shrinking generator with fixed connections
    • Lecture Notes in Computer Science, (Springer- Verlag)
    • Ekdahl, P., Johansson, T. & Meier, W. [2003] "Predicting the shrinking generator with fixed connections," Advances in Cryptology: EUROCRYPT 03, Lecture Notes in Computer Science, Vol.2656 (Springer- Verlag), pp. 330-344.
    • (2003) Advances in Cryptology: EUROCRYPT 03 , vol.2656 , pp. 330-344
    • Ekdahl, P.1    Johansson, T.2    Meier, W.3
  • 10
    • 0001816458 scopus 로고
    • Quantitative universality for a class of nonlinear transformations
    • Feigenbaum, M. G. [1978] "Quantitative universality for a class of nonlinear transformations," J. Stat. Phys. 19, 25-52.
    • (1978) J. Stat. Phys. , vol.19 , pp. 25-52
    • Feigenbaum, M.G.1
  • 11
    • 85036744712 scopus 로고    scopus 로고
    • available online at
    • Gilmore, R. [2009] "Logistic map," available online at http://einstein.drexel.edu/?bob/PHYS750 NLD/ ch2.pdf.
    • (2009) Logistic Map
    • Gilmore, R.1
  • 12
    • 84880855404 scopus 로고    scopus 로고
    • Correlation analysis of the shrinking generator
    • Lecture Notes in Computer Science
    • Golic, J. [2001] "Correlation analysis of the shrinking generator," Advances in Cryptology: CRYPTO 01, Lecture Notes in Computer Science, Vol.2139 (Springer-Verlag), pp. 440-457.
    • (2001) Advances in Cryptology: CRYPTO 01 , vol.2139 , pp. 440-457
    • Golic, J.1
  • 14
    • 84949426591 scopus 로고    scopus 로고
    • Scream: A software-efficient stream cipher
    • Lecture Notes in Computer Science, (Springer-Verlag)
    • Halevi, S., Coppersmith, D. & Jutla, C. [2002] "Scream: A software-efficient stream cipher," Fast Software Encryption: FSE 02, Lecture Notes in Computer Science, Vol.2365 (Springer-Verlag), pp. 195-209.
    • (2002) Fast Software Encryption: FSE 02 , vol.2365 , pp. 195-209
    • Halevi, S.1    Coppersmith, D.2    Jutla, C.3
  • 15
    • 26444452700 scopus 로고    scopus 로고
    • Some attacks on the bit-search generator
    • Lecture Notes in Computer Science (Springer-Verlag)
    • Hell, M. & Johansson, T. [2005] "Some attacks on the bit-search generator," Fast Software Encryption: FSE 05, Lecture Notes in Computer Science, Vol.3557 (Springer-Verlag), pp. 215-227.
    • (2005) Fast Software Encryption: FSE 05 , vol.3557 , pp. 215-227
    • Hell, M.1    Johansson, T.2
  • 17
    • 0005205415 scopus 로고    scopus 로고
    • Analysis of some recently proposed chaos-based encryption algorithms
    • Jakimoski G., Kocarev L. [2001] "Analysis of some recently proposed chaos-based encryption algorithms," Phys. Lett. A 291, 381-384.
    • (2001) Phys. Lett. A , vol.291 , pp. 381-384
    • Jakimoski, G.1    Kocarev, L.2
  • 20
    • 69249152191 scopus 로고    scopus 로고
    • Irregularly decimated chaotic map(s) for binary digits generations
    • Kanso, A. & Smaoui, N. [2009] "Irregularly decimated chaotic map(s) for binary digits generations," Int. J. Bifurcation and Chaos 19, 1169-1183.
    • (2009) Int. J. Bifurcation and Chaos , vol.19 , pp. 1169-1183
    • Kanso, A.1    Smaoui, N.2
  • 21
    • 0000966372 scopus 로고    scopus 로고
    • Logistic map as a block encryption algorithm
    • Kocarev, L. & Jakimoski, G. [2001] "Logistic map as a block encryption algorithm," Phys. Lett. A 289, 199-206.
    • (2001) Phys. Lett. A , vol.289 , pp. 199-206
    • Kocarev, L.1    Jakimoski, G.2
  • 22
    • 84974731225 scopus 로고    scopus 로고
    • Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography
    • Lecture Notes in Computer Science, (Springer- Verlag)
    • Li, S., Mou, X. & Cai, Y. [2001a] "Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography," Advances in Cryptology: INDOCRYPT 01, Lecture Notes in Computer Science, Vol.2247 (Springer- Verlag), pp. 316-329.
    • (2001) Advances in Cryptology: INDOCRYPT 01 , vol.2247 , pp. 316-329
    • Li, S.1    Mou, X.2    Cai, Y.3
  • 23
    • 18244420943 scopus 로고    scopus 로고
    • Improving security of a chaotic encryption approach
    • Li, S., Mou, X. & Cai, Y. [2001b] "Improving security of a chaotic encryption approach," Phys. Lett. A 290, 127-133.
    • (2001) Phys. Lett. A , vol.290 , pp. 127-133
    • Li, S.1    Mou, X.2    Cai, Y.3
  • 24
    • 84950900200 scopus 로고
    • On the derivation of a chaotic encryption algorithm
    • Matthews, R. [1989] "On the derivation of a chaotic encryption algorithm," Cryptologia XIII, 29-42.
    • (1989) Cryptologia , vol.13 , pp. 29-42
    • Matthews, R.1
  • 25
    • 84859054985 scopus 로고    scopus 로고
    • Cryptanalysis of RC4- like ciphers
    • Lecture Notes in Computer Science, (Springer-Verlag)
    • Mister, S. & Tavares, S. [1999] "Cryptanalysis of RC4- like ciphers," Selected Areas in Cryptography: SAC 99, Lecture Notes in Computer Science, Vol.1556 (Springer-Verlag), pp. 131-143.
    • (1999) Selected Areas in Cryptography: SAC 99 , vol.1556 , pp. 131-143
    • Mister, S.1    Tavares, S.2
  • 27
    • 35949008275 scopus 로고
    • Roundoffinduced periodicity and the correlation dimension of chaotic attractors
    • Ott, E., Grebogi, C. & Yorke, J. A. [1988] "Roundoffinduced periodicity and the correlation dimension of chaotic attractors," Phys. Rev. A 38, 3688-3692.
    • (1988) Phys. Rev. A , vol.38 , pp. 3688-3692
    • Ott, E.1    Grebogi, C.2    Yorke, J.A.3
  • 29
    • 84890522850 scopus 로고
    • Communication theory of secrecy system
    • Shannon, C. E. [1949] "Communication theory of secrecy system," Bell Syst. Tech. J. 28, 656-715.
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 30
    • 84950879089 scopus 로고
    • Problems with chaotic cryptosystems
    • Wheeler, D. [1989] "Problems with chaotic cryptosystems," Cryptologia XIII, 243-250.
    • (1989) Cryptologia , vol.13 , pp. 243-250
    • Wheeler, D.1
  • 31
    • 84950905409 scopus 로고
    • Supercomputer investigations of a chaotic encryption algorithm
    • Wheeler, D. & Matthews, R. [1991] "Supercomputer investigations of a chaotic encryption algorithm," Cryptologia XV, 140-151.
    • (1991) Cryptologia , vol.15 , pp. 140-151
    • Wheeler, D.1    Matthews, R.2
  • 32
    • 1842842992 scopus 로고    scopus 로고
    • Parameter estimation only from the symbolic sequences generated by chaos system
    • Wu, X., Hu, H. & Zhang, B. [2004] "Parameter estimation only from the symbolic sequences generated by chaos system," Chaos Solit. Fract. 22, 359-366.
    • (2004) Chaos Solit. Fract. , vol.22 , pp. 359-366
    • Wu, X.1    Hu, H.2    Zhang, B.3
  • 33
    • 0030635241 scopus 로고    scopus 로고
    • Generating chaotic secure sequences with desired statistical properties and high security
    • Zhou, H. & Ling, X. T. [1997] "Generating chaotic secure sequences with desired statistical properties and high security," Int. J. Bifurcation and Chaos 7, 205-213.
    • (1997) Int. J. Bifurcation and Chaos , vol.7 , pp. 205-213
    • Zhou, H.1    Ling, X.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.