-
1
-
-
77955995885
-
Cryptanalysis of chaotic convolutional coder
-
J. T. Zhou and O. C. Au, "Cryptanalysis of chaotic convolutional coder," inProc. IEEEISCAS, 2010, pp. 145-148.
-
(2010)
Proc. IEEEISCAS
, pp. 145-148
-
-
Zhou, J.T.1
Au, O.C.2
-
2
-
-
53849102204
-
A connection between chaotic and conventional cryptography
-
Jul.
-
G. Millerioux, J. M. Amigo, and J. Daafouz, "A connection between chaotic and conventional cryptography," IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 55, no. 6, pp. 1695-1703, Jul. 2008.
-
(2008)
IEEE Trans. Circuits Syst. I, Reg. Papers
, vol.55
, Issue.6
, pp. 1695-1703
-
-
Millerioux, G.1
Amigo, J.M.2
Daafouz, J.3
-
3
-
-
0343689904
-
Synchronization in chaotic systems
-
Feb.
-
L. M. Pecora and T. L. Carroll, "Synchronization in chaotic systems," Phys. Rev. Lett., vol. 64, no. 8, pp. 821-824, Feb. 1990.
-
(1990)
Phys. Rev. Lett.
, vol.64
, Issue.8
, pp. 821-824
-
-
Pecora, L.M.1
Carroll, T.L.2
-
4
-
-
0000072208
-
Exper-imental demonstration of secure communications via chaotic synchro-nization
-
L. Kocarev, K. S. Halle, K. Eckert, L. O. Chua, and U. Parlitz, "Exper-imental demonstration of secure communications via chaotic synchro-nization,"Int. J. Bifurcation Chaos, vol. 2, no. 3, pp. 709-713, 1992.
-
(1992)
Int. J. Bifurcation Chaos
, vol.2
, Issue.3
, pp. 709-713
-
-
Kocarev, L.1
Halle, K.S.2
Eckert, K.3
Chua, L.O.4
Parlitz, U.5
-
5
-
-
0028369325
-
A chaotic direct-sequence spread spectrum communication system
-
Feb.-Apr.
-
G. Heidari-Bateni and C. D. McGillem, "A chaotic direct-sequence spread spectrum communication system,"IEEE Trans. Commun., vol. 42, no. 2-4, pp. 1524-1527, Feb.-Apr. 1994.
-
(1994)
IEEE Trans. Commun.
, vol.42
, Issue.2-4
, pp. 1524-1527
-
-
Heidari-Bateni, G.1
McGillem, C.D.2
-
7
-
-
4444346865
-
Chaos-based cryptography: Abriefoverview
-
Third Quarter
-
L. Kocarev, "Chaos-based cryptography: Abriefoverview,"IEEECir- cuits Syst. Mag., vol. 1, no. 3, pp. 6-21, Third Quarter, 2001.
-
(2001)
IEEECir-cuits Syst. Mag.
, vol.1
, Issue.3
, pp. 6-21
-
-
Kocarev, L.1
-
8
-
-
37649026967
-
Chaos-based se-cure communications in a large community
-
Dec.
-
S. Wang, J. Kuang, J. Li, Y. Luo, H. Lu, and G. Hu, "Chaos-based se-cure communications in a large community,"Phys. Rev. E, Stat. Phys. Plasmas Fluids Relat Interdiscip. Top., vol. 66, no. 6, p. 065 202(R), Dec. 2002.
-
(2002)
Phys. Rev. E, Stat. Phys. Plasmas Fluids Relat Interdiscip. Top.
, vol.66
, Issue.6
-
-
Wang, S.1
Kuang, J.2
Li, J.3
Luo, Y.4
Lu, H.5
Hu, G.6
-
9
-
-
23144460039
-
Security of public-key cryptosystems based on Chebyshev polynomials
-
DOI 10.1109/TCSI.2005.851701
-
P. Bergamo, P. D'Arco, A. De Santis, and L. Kocarev, "Security of public-key cryptosystems based on Chebyshev polynomials," IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 52, no. 7, pp. 1382-1393, Jul. 2005. (Pubitemid 41078438)
-
(2005)
IEEE Transactions on Circuits and Systems I: Regular Papers
, vol.52
, Issue.7
, pp. 1382-1393
-
-
Bergamo, P.1
D'Arco, P.2
De Santis, A.3
Kocarev, L.4
-
10
-
-
33746074433
-
Markov-jump-system-based secure chaotic communication
-
DOI 10.1109/TCSI.2006.877885
-
T. Sathyan and T. Kirubarajan, "Markov-jump-system-based secure chaotic communication," IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 53, no. 7, pp. 1597-1609, Jul. 2006. (Pubitemid 44070172)
-
(2006)
IEEE Transactions on Circuits and Systems I: Regular Papers
, vol.53
, Issue.7
, pp. 1597-1609
-
-
Sathyan, T.1
Kirubarajan, T.2
-
11
-
-
33747888871
-
Secure communication scheme based on asymptotic model of deterministic randomness
-
DOI 10.1016/j.physleta.2006.05.032, PII S0375960106007638
-
J. T. Zhou, W. J. Pei, K. Wang, J. Huang, and Z. Y. He, "Secure communication scheme based on asymptotic model of deterministic randomness," Phys. Lett. A, vol. 358, no. 4, pp. 283-288, Oct. 2006. (Pubitemid 44293104)
-
(2006)
Physics Letters, Section A: General, Atomic and Solid State Physics
, vol.358
, Issue.4
, pp. 283-288
-
-
Zhou, J.1
Pei, W.2
Wang, K.3
Huang, J.4
He, Z.5
-
12
-
-
58049197860
-
Error correction with chaotic switching between convolutional codecs
-
Dec.
-
T. Y. Ng, L. Y. Chew, and S. Puthusserypady, "Error correction with chaotic switching between convolutional codecs," IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 55, no. 11, pp. 3655-3662, Dec. 2008.
-
(2008)
IEEE Trans. Circuits Syst. I, Reg. Papers
, vol.55
, Issue.11
, pp. 3655-3662
-
-
Ng, T.Y.1
Chew, L.Y.2
Puthusserypady, S.3
-
13
-
-
33748523842
-
Enhancing the security of delayed differential chaotic systems with programmable feedback
-
DOI 10.1109/TCSII.2006.876405
-
C. Robilliard, E. H. Huntington, and J. G. Webb, "Enhancing the secu-rity of delayed differential chaotic systems with programmable feed-back," IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 53, no. 8, pp. 722-726, Aug. 2006. (Pubitemid 44363886)
-
(2006)
IEEE Transactions on Circuits and Systems II: Express Briefs
, vol.53
, Issue.8
, pp. 722-726
-
-
Robilliard, C.1
Huntington, E.H.2
Webb, J.G.3
-
15
-
-
79952006504
-
-
U.S. Patent4208 739, Jun. 17
-
S. C. Lu, L. Lee, and R. J. F. Fang, "Integrated encryption and channel codingtechnique,"U.S. Patent4208 739, Jun. 17, 1980.
-
(1980)
Integrated Encryption and Channel Codingtechnique
-
-
Lu, S.C.1
Lee, L.2
Fang, R.J.F.3
-
16
-
-
33645805455
-
A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system
-
Apr.
-
R. Bose and S. Pathak, "A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system," IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 53, no. 4, pp. 848-857, Apr. 2006.
-
(2006)
IEEE Trans. Circuits Syst. I, Reg. Papers
, vol.53
, Issue.4
, pp. 848-857
-
-
Bose, R.1
Pathak, S.2
-
17
-
-
57149122871
-
Comments on A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system
-
Nov.
-
J. T. Zhou and O. C. Au, "Comments on "A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system"," IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 55, no. 10, pp. 3368-3369, Nov. 2008.
-
(2008)
IEEETrans. CircuitsSyst. I, Reg. Papers
, vol.55
, Issue.10
, pp. 3368-3369
-
-
Zhou, J.T.1
Au, O.C.2
-
18
-
-
77649342378
-
Simultaneous arithmetic coding and encryption using chaotic maps
-
Feb.
-
K. W. Wong, Q. Z. Lin, and J. Y. Chen, "Simultaneous arithmetic coding and encryption using chaotic maps," IEEE Trans. Circuits Syst. 11, Exp. Briefs, vol. 57, no. 2, pp. 146-150, Feb. 2010.
-
(2010)
IEEE Trans. Circuits Syst. 11, Exp. Briefs
, vol.57
, Issue.2
, pp. 146-150
-
-
Wong, K.W.1
Lin, Q.Z.2
Chen, J.Y.3
-
19
-
-
57949091424
-
Embedding compression in chaos-based cryptography
-
Nov.
-
K. W. Wong and C. H. Yuen, "Embedding compression in chaos-based cryptography," IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 55, no. 11, pp. 1193-1197, Nov. 2008.
-
(2008)
IEEE Trans. Circuits Syst. II, Exp. Briefs
, vol.55
, Issue.11
, pp. 1193-1197
-
-
Wong, K.W.1
Yuen, C.H.2
-
20
-
-
55549110074
-
Arithmetic coding as anon-linear dynamical system
-
Apr.
-
N. Nagaraj, P. G. Vaidya, and K. G. Bhat, "Arithmetic coding as anon-linear dynamical system," Commun. Nonlinear Sci. Numer. Simul., vol. 14, no. 4, pp. 1013-1020, Apr. 2009.
-
(2009)
Commun. Nonlinear Sci. Numer. Simul.
, vol.14
, Issue.4
, pp. 1013-1020
-
-
Nagaraj, N.1
Vaidya, P.G.2
Bhat, K.G.3
-
21
-
-
33749506982
-
Multimedia selective encryption by means of randomized arithmetic coding
-
DOI 10.1109/TMM.2006.879919, 1703505
-
M. Grangetto, E. Magli, and G. Olmo, "Multimedia selective encryp-tion by means of randomized arithmetic coding," IEEE Trans. Multi-media, vol. 8, no. 5, pp. 905-917, Oct. 2006. (Pubitemid 44523105)
-
(2006)
IEEE Transactions on Multimedia
, vol.8
, Issue.5
, pp. 905-917
-
-
Grangetto, M.1
Magli, E.2
Olmo, G.3
-
22
-
-
26844567623
-
Design of integrated multimedia compression and encryption systems
-
DOI 10.1109/TMM.2005.854469
-
C. Wu and C.-C. J. Kuo, "Design ofintegrated multimedia compression and encryption systems," IEEE Trans. Multimedia, vol. 7, no. 5, pp. 828-839, Oct. 2005. (Pubitemid 41452511)
-
(2005)
IEEE Transactions on Multimedia
, vol.7
, Issue.5
, pp. 828-839
-
-
Wu, C.-P.1
Kuo, C.-C.J.2
-
23
-
-
31344478024
-
Binary arithmetic coding with key-based interval splitting
-
DOI 10.1109/LSP.2005.861589
-
J. T. Wen, H. Kim, and J. D. Villasenor, "Binary arithmetic coding with key-based interval splitting," IEEE Signal Process. Lett., vol. 13, no. 2, pp. 69-72, Feb. 2006. (Pubitemid 43137974)
-
(2006)
IEEE Signal Processing Letters
, vol.13
, Issue.2
, pp. 69-72
-
-
Wen, J.G.1
Kim, H.2
Villasenor, J.D.3
-
24
-
-
34247866284
-
Secure arithmetic coding
-
DOI 10.1109/TSP.2007.892710
-
H. Kim, J. T. Wen, and J. D. Villasenor, "Secure arithmetic coding," IEEE Trans. SignalProcess.,vol. 55, no. 5, pp. 2263-2272, May 2007. (Pubitemid 46691604)
-
(2007)
IEEE Transactions on Signal Processing
, vol.55
, Issue.5 II
, pp. 2263-2272
-
-
Kim, H.1
Wen, J.2
Villasenor, J.D.3
-
25
-
-
33947609586
-
Security analysis of multimedia encryption schemes based on multiple Huffman table
-
DOI 10.1109/LSP.2006.884012
-
J. T. Zhou, Z. Q. Liang, Y. Chen, and O. C. Au, "Security analysis of multimedia encryption schemes based on multiple Huffman table," IEEESignalProcess. Lett., vol. 14, no. 3, pp. 201-204, Mar. 2007. (Pubitemid 46477702)
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.3
, pp. 201-204
-
-
Zhou, J.1
Liang, Z.2
Chen, Y.3
Au, O.C.4
-
26
-
-
65649146097
-
Adaptive chosen-ciphertext attack on secure arithmetic coding
-
May
-
J. T. Zhou, O. C. Au, and P. W. Wong, "Adaptive chosen-ciphertext attack on secure arithmetic coding,"IEEE Trans. SignalProcess., vol. 57, no. 5, pp. 1825-1838, May 2009.
-
(2009)
IEEE Trans. SignalProcess.
, vol.57
, Issue.5
, pp. 1825-1838
-
-
Zhou, J.T.1
Au, O.C.2
Wong, P.W.3
-
27
-
-
41549134129
-
Cryptanalysis of some multimedia encryption schemes
-
DOI 10.1109/TMM.2008.917355, 4459284
-
G. Jakimoski and K. P. Subbalakshmi, "Cryptanalysis of some multi-media encryption schemes," IEEE Trans. Multimedia, vol. 10, no. 3, pp. 330-338, Apr. 2008. (Pubitemid 351459497)
-
(2008)
IEEE Transactions on Multimedia
, vol.10
, Issue.3
, pp. 330-338
-
-
Jakimoski, G.1
Subbalakshmi, K.P.2
-
28
-
-
70450285600
-
Onthe security ofthe secure arithmetic code
-
Dec.
-
H. M. Sun, K. H. Wang, and W. C. Ting, "Onthe security ofthe secure arithmetic code," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 781-789, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.4
, pp. 781-789
-
-
Sun, H.M.1
Wang, K.H.2
Ting, W.C.3
-
29
-
-
60149105970
-
On the security of an MPEG-video encryption scheme based on secret Huffman tables
-
Lecture Notes in Computer Science
-
S. J. Li, G. R. Chen, A. Cheung, K. T. Lo, and M. Kankanhalli, "On the security of an MPEG-video encryption scheme based on secret Huffman tables," in Proc. 3rd Pacific Rim Symp. Adv. Image Video Technol., 2009, vol. 5414, Lecture Notes in Computer Science, pp. 898-909.
-
(2009)
Proc. 3rd Pacific Rim Symp. Adv. Image Video Technol.
, vol.5414
, pp. 898-909
-
-
Li, S.J.1
Chen, G.R.2
Cheung, A.3
Lo, K.T.4
Kankanhalli, M.5
-
30
-
-
33751422217
-
Trellis-hopping turbo coding
-
DOI 10.1049/ip-com:20050547
-
J. C. Moreira, D. M. Petruzzi, and M. C. Liberatori, "Trellis- hopping turbo coding,"Proc. Inst. Elect. Eng.\Commun., vol. 153, no. 6, pp. 966-975, Dec. 2006. (Pubitemid 44818425)
-
(2006)
IEE Proceedings: Communications
, vol.153
, Issue.6
, pp. 966-975
-
-
Moreira, J.C.1
Petruzzi, D.M.2
Liberatori, M.C.3
Honary, B.4
-
31
-
-
33749838738
-
Construction of an elliptic curve over finite fields to combine with convolutional code for cryptography
-
DOI 10.1049/ip-cds:20050117
-
B. Ontiveros, I. Soto, and R. Carrasco, "Construction of an elliptic curve over finite fields to combine with convolutional code for cryp-tography,"Proc. Inst. Elect. Eng.\CircuitsDevices Syst., vol. 153, no. 4, pp. 299-306, Aug. 2006. (Pubitemid 44561793)
-
(2006)
IEE Proceedings: Circuits, Devices and Systems
, vol.153
, Issue.4
, pp. 299-306
-
-
Ontiveros, B.1
Soto, I.2
Carrasco, R.3
-
36
-
-
33845570269
-
-
Sci. Eng. Dept., Univ. California, San Diego, CA Tech. Rep.
-
F. Uyeda, H. Xia, and A. A. Chien, Evaluation ofahigh performance erasure code implementation Comput. Sci. Eng. Dept., Univ. California, San Diego, CA, 2004, Tech. Rep.
-
(2004)
Evaluation Ofahigh Performance Erasure Code Implementation Comput
-
-
Uyeda, F.1
Xia, H.2
Chien, A.A.3
-
37
-
-
33745166587
-
Raptor codes
-
DOI 10.1109/TIT.2006.874390
-
A. Shokrollahi, "Raptor codes," IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2551-2567, Jun. 2006. (Pubitemid 43898908)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.6
, pp. 2551-2567
-
-
Shokrollahi, A.1
-
38
-
-
79952007846
-
Application of Gray code to the cryptanalysis of chaotic cryptosystems
-
[Online]. Available:
-
G. Alvarez, D. Arroyo, and J. Nunez, "Application of Gray code to the cryptanalysis of chaotic cryptosystems," in Proc. 3rd Int. IEEE Sci. Conf. Phys. Control, 2007 [Online]. Available: http://lib.physcon.ru/item=1358
-
(2007)
Proc. 3rd Int. IEEE Sci. Conf. Phys. Control
-
-
Alvarez, G.1
Arroyo, D.2
Nunez, J.3
-
39
-
-
0032091839
-
Gray codes and 1D quadratic maps
-
G. Alvarez, M. Romera, G. Pastor, and F. Montoya, "Gray codes and 1D quadratic maps," Electron. Lett., vol. 34, no. 13, pp. 1304-1306, Jun. 1998. (Pubitemid 128624586)
-
(1998)
Electronics Letters
, vol.34
, Issue.13
, pp. 1304-1306
-
-
Alvarez, G.1
Romera, M.2
Pastor, G.3
Montoya, F.4
|