-
1
-
-
0031139753
-
Cryptography based on chaotic systems
-
T. Yang, C. W. Wu, and L. O. Chua, "Cryptography Based on Chaotic Systems", IEEE Trans, on CAS-I, 1997, vol.44, no.5, pp. 469-472.
-
(1997)
IEEE Trans, on CAS-I
, vol.44
, Issue.5
, pp. 469-472
-
-
Yang, T.1
Wu, C.W.2
Chua, L.O.3
-
2
-
-
58349096239
-
Synchronization of the unified chaotic system and application in secure communication
-
J. M. V. Grzybowski, M. Rafikov, and J. M. Balthaza, " Synchronization of the unified chaotic system and application in secure communication", Communications in Nonlinear Science and Numerical Simulation, 2009, vol.14, no.6, pp. 2793-2806.
-
(2009)
Communications in Nonlinear Science and Numerical Simulation
, vol.14
, Issue.6
, pp. 2793-2806
-
-
Grzybowski, J.M.V.1
Rafikov, M.2
Balthaza, J.M.3
-
3
-
-
4444346865
-
Chaos-based cryptography: A brief overview
-
L. Kocarev, "Chaos-based cryptography: A brief overview", IEEE Circuits and Systems Magazine, 2001, vol.1, no.3, pp. 6-21.
-
(2001)
IEEE Circuits and Systems Magazine
, vol.1
, Issue.3
, pp. 6-21
-
-
Kocarev, L.1
-
4
-
-
0032089417
-
Symmetric ciphers based on two-dimensional chaotic maps
-
J. Fridrich, "Symmetric ciphers basedon two-dimensional chaoticmaps", Int. J. Bifurcation and Chaos, 1998, vol. 8, no. 6, 1259-1284. (Pubitemid128164495)
-
(1998)
International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
, vol.8
, Issue.6
, pp. 1259-1284
-
-
Fridrich, J.1
-
5
-
-
1342306864
-
A symmetric image encryption based on 3D chaotic maps
-
G. R. Chen, Y. Mao, and C. K. Chui, "A symmetric image encryption based on 3D chaotic maps", Chaos, Solitons & Fractals, 2004, vol.21, no.3, pp. 749-761.
-
(2004)
Chaos, Solitons & Fractals
, vol.21
, Issue.3
, pp. 749-761
-
-
Chen, G.R.1
Mao, Y.2
Chui, C.K.3
-
6
-
-
57749200497
-
Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator
-
X. J. Tong and M. G. Cui, "Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator", Signal Processing, 2009, vol.89, no.4, pp. 480-491.
-
(2009)
Signal Processing
, vol.89
, Issue.4
, pp. 480-491
-
-
Tong, X.J.1
Cui, M.G.2
-
7
-
-
64749107452
-
OCML-based colour image encryption
-
R. Rhouma, S. Meherzi, and S. Belghith, "OCML-based colour image encryption", Chaos, Solitons & Fractals, 2009, vol.40, no.1, pp. 309-318.
-
(2009)
Chaos, Solitons & Fractals
, vol.40
, Issue.1
, pp. 309-318
-
-
Rhouma, R.1
Meherzi, S.2
Belghith, S.3
-
8
-
-
33846348219
-
Chaotic keyed hash function based on feedforwardCfeedback nonlinear digital filter
-
J. S. Zhang, X. M. Wang, and W. F. Zhang, "Chaotic keyed hash function based on feedforwardCfeedback nonlinear digital filter", Phys. Lett. A, 2007, vol.362, no.5-6, pp. 439-448.
-
(2007)
Phys. Lett. A
, vol.362
, Issue.5-6
, pp. 439-448
-
-
Zhang, J.S.1
Wang, X.M.2
Zhang, W.F.3
-
9
-
-
56349124802
-
A double-piped iterated hash function based on a hybrid of chaotic maps
-
J. Peng, D. Zhang, Y. G. Liu, et al., "A double-piped iterated hash function based on a hybrid of chaotic maps", The 7th IEEE Int. Conf. on Cognitive Informatics (ICCI'08), 2008, pp. 358-365.
-
(2008)
The 7th IEEE Int. Conf. on Cognitive Informatics (ICCI'08)
, pp. 358-365
-
-
Peng, J.1
Zhang, D.2
Liu, Y.G.3
-
11
-
-
29244491993
-
On the dynamical degradation of digital piecewise linear chaotic maps
-
S. J. Li, G. R. Chen, and. X. Q. Mou, "On the dynamical degradation of digital piecewise linear chaotic maps," Int. J. Bifurcation and Chaos, 2005, vol.15, no.10, pp. 3119-3151.
-
(2005)
Int. J. Bifurcation and Chaos
, vol.15
, Issue.10
, pp. 3119-3151
-
-
Li, S.J.1
Chen, G.R.2
Mou, X.Q.3
-
12
-
-
4243129231
-
A novel method for designing S-boxes based on chaotic maps
-
G. P. Tang, X. F. Liao, and Y. Chen, "A novel method for designing S-boxes based on chaotic maps", Chaos, Solitons & Fractals, 2005, vol.23, no.2, pp. 413-419.
-
(2005)
Chaos, Solitons & Fractals
, vol.23
, Issue.2
, pp. 413-419
-
-
Tang, G.P.1
Liao, X.F.2
Chen, Y.3
-
14
-
-
84890522850
-
Communication theory of secrecy system
-
C. E. Shannon, "Communication theory of secrecy system", The Bell System Technical Journal, 1949, vol.28, no.4, pp. 656-715.
-
(1949)
The Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
15
-
-
84903595110
-
Differential cryptanalysis of DES-like cryptosystems
-
LNCS 537
-
E. Biham and A. Shamir, "Differential cryptanalysis of DES-like cryptosystems", Advances in Cryptology CRYPTO'90, 1991, LNCS 537, pp. 2-21
-
(1991)
Advances in Cryptology CRYPTO'90
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
17
-
-
0001820140
-
Cryptography and computer privacy
-
H. Feistel, "Cryptography and computer privacy", Scientific American, 1973, vol.228, no.5, pp. 15-23.
-
(1973)
Scientific American
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistel, H.1
-
18
-
-
0029632010
-
Provable security against a differential attack
-
K. Nyberg and L. Knudsen, "Provable security against a differential attack", Journal of Cryptology, 1995, vol.8, no.1, pp. 27-37.
-
(1995)
Journal of Cryptology
, vol.8
, Issue.1
, pp. 27-37
-
-
Nyberg, K.1
Knudsen, L.2
-
19
-
-
33747067464
-
Chaotic block ciphers: From theory to practical algorithms
-
N. Masuda, G. Jakimoski, K. Aihara, and L. Kocarev, "Chaotic Block Ciphers: From Theory to Practical Algorithms", IEEE Trans. CAS-I, 2006, vol.53, no.6, pp. 1341-1352.
-
(2006)
IEEE Trans. CAS-I
, vol.53
, Issue.6
, pp. 1341-1352
-
-
Masuda, N.1
Jakimoski, G.2
Aihara, K.3
Kocarev, L.4
|