-
3
-
-
77952236404
-
A fast image encryption and authentication scheme based on chaotic maps
-
Yang H.Q., Wong K.W., Liao X.F., Zhang W., Wei P.C. A fast image encryption and authentication scheme based on chaotic maps. Commun Nonlinear Sci Numer Simul 2010, 14:3507-3517.
-
(2010)
Commun Nonlinear Sci Numer Simul
, vol.14
, pp. 3507-3517
-
-
Yang, H.Q.1
Wong, K.W.2
Liao, X.F.3
Zhang, W.4
Wei, P.C.5
-
4
-
-
59949096428
-
A block cipher with dynamic S-boxes based on tent map
-
Wang Y., Wong K.W., Liao X.F., Xiang T. A block cipher with dynamic S-boxes based on tent map. Commun Nonlinear Sci Numer Simul 2009, 14:3089-3099.
-
(2009)
Commun Nonlinear Sci Numer Simul
, vol.14
, pp. 3089-3099
-
-
Wang, Y.1
Wong, K.W.2
Liao, X.F.3
Xiang, T.4
-
7
-
-
2442684584
-
A combined chaotic cryptographic and hashing scheme
-
Wong K.W. A combined chaotic cryptographic and hashing scheme. Phys Lett A 2003, 307:292-298.
-
(2003)
Phys Lett A
, vol.307
, pp. 292-298
-
-
Wong, K.W.1
-
8
-
-
9644303109
-
One-way Hash function construction based on the chaotic map with changeable parameter
-
Xiao D., Liao X.F., Deng S.J. One-way Hash function construction based on the chaotic map with changeable parameter. Chaos, Solitons Fract 2005, 24:65-71.
-
(2005)
Chaos, Solitons Fract
, vol.24
, pp. 65-71
-
-
Xiao, D.1
Liao, X.F.2
Deng, S.J.3
-
9
-
-
22244444503
-
Hash function based on chaotic tent maps
-
Yi X. Hash function based on chaotic tent maps. IEEE Trans Circuits Syst II 2005, 52:354-357.
-
(2005)
IEEE Trans Circuits Syst II
, vol.52
, pp. 354-357
-
-
Yi, X.1
-
10
-
-
33748433928
-
Secure hash function based on neural network
-
Lian S.G., Sun J.S., Wang Z.Q. Secure hash function based on neural network. Neurocomputing 2006, 69:2346-2350.
-
(2006)
Neurocomputing
, vol.69
, pp. 2346-2350
-
-
Lian, S.G.1
Sun, J.S.2
Wang, Z.Q.3
-
11
-
-
33644670737
-
A chaos-based cryptographic hash function for message authentication
-
Kwok H.S., Tang W.K.S. A chaos-based cryptographic hash function for message authentication. Int J Bifur Chaos 2005, 15:4043-4050.
-
(2005)
Int J Bifur Chaos
, vol.15
, pp. 4043-4050
-
-
Kwok, H.S.1
Tang, W.K.S.2
-
12
-
-
67349196408
-
A novel combined cryptographic and hash algorithm based on chaotic control character
-
Deng S.J., Xiao D., Li Y.T., Peng W.B. A novel combined cryptographic and hash algorithm based on chaotic control character. Commun Nonlinear Sci Numer Simul 2009, 14:3889-3900.
-
(2009)
Commun Nonlinear Sci Numer Simul
, vol.14
, pp. 3889-3900
-
-
Deng, S.J.1
Xiao, D.2
Li, Y.T.3
Peng, W.B.4
-
13
-
-
67349180690
-
Parallel keyed Hash function construction based on chaotic neural network
-
Xiao D., Liao X.F., Wang Y. Parallel keyed Hash function construction based on chaotic neural network. Neurocomputing 2009, 72:2288-2296.
-
(2009)
Neurocomputing
, vol.72
, pp. 2288-2296
-
-
Xiao, D.1
Liao, X.F.2
Wang, Y.3
-
14
-
-
0011285982
-
Design of one-dimensional chaotic maps with prescribed statistical properties
-
Baranousky A., Daems D. Design of one-dimensional chaotic maps with prescribed statistical properties. Int J Bifur Chaos 1995, 5(6):1585-1598.
-
(1995)
Int J Bifur Chaos
, vol.5
, Issue.6
, pp. 1585-1598
-
-
Baranousky, A.1
Daems, D.2
-
15
-
-
0026122066
-
What every computer scientist should know about floating-point arithmetic
-
Goldberg D., Priest D. What every computer scientist should know about floating-point arithmetic. ACM Comput Surv ACM Comput Surv 1991, 23:5-48.
-
(1991)
ACM Comput Surv ACM Comput Surv
, vol.23
, pp. 5-48
-
-
Goldberg, D.1
Priest, D.2
|