-
1
-
-
0017018484
-
New direction in cryptography
-
Diffie Whitfield, Hellman Martin E. New direction in cryptography. IEEE Trans Inform Theory 1976, 22(6):644-654.
-
(1976)
IEEE Trans Inform Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
2
-
-
0042786512
-
Cryptography with chaos
-
Baptista M.S. Cryptography with chaos. Phys Lett A 1998, 240(1-2):50-54.
-
(1998)
Phys Lett A
, vol.240
, Issue.1-2
, pp. 50-54
-
-
Baptista, M.S.1
-
3
-
-
4444346865
-
Chaos-based cryptography: a brief overview
-
Kocarev Ljupco Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 2001, 1(3):6-21.
-
(2001)
IEEE Circuits Syst Mag
, vol.1
, Issue.3
, pp. 6-21
-
-
Kocarev, L.1
-
4
-
-
77949488987
-
A new compound mode of confusion and diffusion for block encryption of image based on chaos
-
Wang Xing-yuan, Chen Feng, Wang Tian A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun Nonlinear Sci Numer Simulat 2010, 15(9):2479-2485.
-
(2010)
Commun Nonlinear Sci Numer Simulat
, vol.15
, Issue.9
, pp. 2479-2485
-
-
Wang, X.-Y.1
Chen, F.2
Wang, T.3
-
5
-
-
34548361693
-
Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
-
Li Chengqing, Li Shujun, Alvarez Gonzalo, Chen Guanrong, Lo Kwok-Tung Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys Lett A 2007, 369(1-2):23-30.
-
(2007)
Phys Lett A
, vol.369
, Issue.1-2
, pp. 23-30
-
-
Li, C.1
Li, S.2
Alvarez, G.3
Chen, G.4
Lo, K.-T.5
-
6
-
-
77949485060
-
A chaos-based hash function with both modification detection and localization capabilities
-
Xiao Di, Shih Frank Y., Liao Xiaofeng A chaos-based hash function with both modification detection and localization capabilities. Commun Nonlinear Sci Numer Simulat 2010, 15(9):2254-2261.
-
(2010)
Commun Nonlinear Sci Numer Simulat
, vol.15
, Issue.9
, pp. 2254-2261
-
-
Xiao, D.1
Shih, F.Y.2
Liao, X.3
-
7
-
-
67649867159
-
Chaos-based hash function (CBHF) for cryptographic applications
-
Amin Mohamed, Faragallah Osama S., Abd El-Latif Ahmed A. Chaos-based hash function (CBHF) for cryptographic applications. Chaos Soliton Fract 2009, 42(2):767-772.
-
(2009)
Chaos Soliton Fract
, vol.42
, Issue.2
, pp. 767-772
-
-
Amin, M.1
Faragallah, O.S.2
Abd El-Latif, A.A.3
-
8
-
-
33751227507
-
A novel key agreement protocol based on chaotic maps
-
Xiao Di, Liao Xiaofeng, Deng Shaojiang A novel key agreement protocol based on chaotic maps. Inform Sci 2007, 177(4):1136-1142.
-
(2007)
Inform Sci
, vol.177
, Issue.4
, pp. 1136-1142
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
9
-
-
43049150816
-
Security of a key agreement protocol based on chaotic maps
-
Han Song Security of a key agreement protocol based on chaotic maps. Chaos Soliton Fract 2008, 38(3):764-768.
-
(2008)
Chaos Soliton Fract
, vol.38
, Issue.3
, pp. 764-768
-
-
Han, S.1
-
10
-
-
85196138565
-
-
"A new key agreement protocol based on chaotic maps", In: Proceedings of Second KES International Symposium-Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2008), Incheon, Korea, March 26-28
-
Eun-Jun Yoon, Kee-Young Yoo. "A new key agreement protocol based on chaotic maps", In: Proceedings of Second KES International Symposium-Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2008), Incheon, Korea, March 26-28, 2008.
-
(2008)
-
-
Yoon, E.-J.1
Yoo, K.-Y.2
-
11
-
-
77958150942
-
Secure group key agreement protocol based on chaotic Hash
-
Guo Xianfeng, Zhang Jiashu Secure group key agreement protocol based on chaotic Hash. Inform Sci 2010, 180(20):4069-4074.
-
(2010)
Inform Sci
, vol.180
, Issue.20
, pp. 4069-4074
-
-
Guo, X.1
Zhang, J.2
-
12
-
-
85196221243
-
-
Bellovin, Michael Merritt. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks, IEEE symposium on research in security and privacy;
-
Steven M. Bellovin, Michael Merritt. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks, IEEE symposium on research in security and privacy; 1992. p. 72-84.
-
(1992)
, pp. 72-84
-
-
Steven, M.1
-
13
-
-
23144460039
-
Security of public-key cryptosystems based on Chebyshev polynomials
-
Bergamo P., Darco P., Santis A.D., et al. Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst Regul 2005, 52(7):1382-1393.
-
(2005)
IEEE Trans Circuits Syst Regul
, vol.52
, Issue.7
, pp. 1382-1393
-
-
Bergamo, P.1
Darco, P.2
Santis, A.D.3
-
14
-
-
85196150164
-
-
A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE international Conference on Communications (ICC09)
-
Tseng H, Jan R, Yang W, A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE international Conference on Communications (ICC09), 2009; p.1-6.
-
(2009)
, pp. 1-6
-
-
Tseng, H.1
Jan, R.2
Yang, W.3
-
15
-
-
78049382801
-
An anonymous key agreement protocol based on chaotic maps
-
Niu Yujun, Wang Xingyuan An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Numer Simulat 2011, 16(4):1986-1992.
-
(2011)
Commun Nonlinear Sci Numer Simulat
, vol.16
, Issue.4
, pp. 1986-1992
-
-
Niu, Y.1
Wang, X.2
-
17
-
-
9644303109
-
One-way Hash function construction based on the chaotic map with changeable-parameter
-
Xiao Di, Liao Xiaofeng, Deng Shaojiang One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos Soliton Fract 2005, 24(1):65-71.
-
(2005)
Chaos Soliton Fract
, vol.24
, Issue.1
, pp. 65-71
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
18
-
-
23144460039
-
Security of public-key cryptosystems based on Chebyshev polynomials
-
Bergamo Pina, Darco Paolo, Santis Alfredo De, Kocarev Ljupco Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst I 2005, 52(7):1382-1393.
-
(2005)
IEEE Trans Circuits Syst I
, vol.52
, Issue.7
, pp. 1382-1393
-
-
Bergamo, P.1
Darco, P.2
Santis, A.D.3
Kocarev, L.4
|