-
1
-
-
0037421353
-
Cryptanalysis of a chaotic secure communication system
-
Alvarez, G., Montoya, F., Romera, M., and Pastor, G. (2003). Cryptanalysis of a chaotic secure communication system. Phys. Lett. A, 306(4), 200-205.
-
(2003)
Phys. Lett. A
, vol.306
, Issue.4
, pp. 200-205
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
2
-
-
0345303927
-
Cryptanalysis of a discrete chaotic cryptosystem using external key
-
Alvarez, G., Montoya, F., Romera, M., and Pastor, G. (2003). Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys. Lett. A, 319, 334-339.
-
(2003)
Phys. Lett. A
, vol.319
, pp. 334-339
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
3
-
-
0039333597
-
Clarifying chaos: Examples and counterexamples
-
Brown, R. and Chua, L. O. (1996). Clarifying chaos: Examples and counterexamples. Int. J. Bifurcation and Chaos, 6(2), 219-249.
-
(1996)
Int. J. Bifurcation and Chaos
, vol.6
, Issue.2
, pp. 219-249
-
-
Brown, R.1
Chua, L.O.2
-
7
-
-
0032089417
-
Symmetric ciphers based on two-dimensional chaotic maps
-
Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation and Chaos, 8, 1259-1284.
-
(1998)
Int. J. Bifurcation and Chaos
, vol.8
, pp. 1259-1284
-
-
Fridrich, J.1
-
10
-
-
33749632318
-
Image encryption using genetic algorithm
-
Husainy, M. (2006). Image encryption using genetic algorithm. Information Technology Journal, 5(3), 516-519.
-
(2006)
Information Technology Journal
, vol.5
, Issue.3
, pp. 516-519
-
-
Husainy, M.1
-
11
-
-
51849099850
-
Application of genetic algorithm in the field of steganography
-
July-December)
-
Kumar, A. and Rajpal, N. (2004, July-December). Application of genetic algorithm in the field of steganography. Journal of Information Technology, 2(1), 12-15.
-
(2004)
Journal of Information Technology
, vol.2
, Issue.1
, pp. 12-15
-
-
Kumar, A.1
Rajpal, N.2
-
12
-
-
84865176107
-
-
NCC'05, January 20-28, IIT Kharagpur
-
Kumar, A., Rajpal, N., and Tayal, A. (2005). New signal security system for multimedia data transmission using genetic algorithms. NCC'05, January 20-28, IIT Kharagpur, pp. 579-583.
-
(2005)
New Signal Security System for Multimedia Data Transmission Using Genetic Algorithms.
, pp. 579-583
-
-
Kumar, A.1
Rajpal, N.2
Tayal, A.3
-
13
-
-
18244420943
-
Improving security of a chaotic encryption approach
-
Li, S., Mou, X., and Cai, Y. (2001). Improving security of a chaotic encryption approach. Phys. Lett. A, 290(3-4), 127-133.
-
(2001)
Phys. Lett. A
, vol.290
, Issue.3-4
, pp. 127-133
-
-
Li, S.1
Mou, X.2
Cai, Y.3
-
14
-
-
0038285043
-
On the security of a chaotic encryption scheme: Problems with computerized chaos in finite computing precision
-
Li, S., Mou, X., Cai, Y., Ji, Z., and Zhang, J. (2003). On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Comput. Phys. Commun., 153, 52-58.
-
(2003)
Comput. Phys. Commun.
, vol.153
, pp. 52-58
-
-
Li, S.1
Mou, X.2
Cai, Y.3
Ji, Z.4
Zhang, J.5
-
15
-
-
21344497984
-
Secure communications via chaotic synchronization. Ii. noise reduction by cascading two identical receivers
-
Lozi, R. and Chua, L. O. (1993). Secure communications via chaotic synchronization. II. Noise reduction by cascading two identical receivers. Int. J. Bifurcation and Chaos, 3(5), 1319-1325.
-
(1993)
Int. J. Bifurcation and Chaos
, vol.3
, Issue.5
, pp. 1319-1325
-
-
Lozi, R.1
Chua, L.O.2
-
16
-
-
0004192381
-
-
Boca Raton, FL: CRC Press
-
Menzes, A. J., Paul, C., Van Dorschot, V., and Vanstone, S. A. (2001). Handbook of applied cryptography. Boca Raton, FL: CRC Press.
-
(2001)
Handbook of Applied Cryptography
-
-
Menzes, A.J.1
Paul, C.2
Van Dorschot, V.3
Vanstone, S.A.4
-
17
-
-
80052824798
-
Design and evaluation of two symmetrical evolutionist-based ciphering algorithms
-
Omary, F., Tragha, A., Bellaachia, A., and Mouloudi, A. (2007, February). Design and evaluation of two symmetrical evolutionist-based ciphering algorithms. IJCSNS International Journal of Computer Science and Network Security, 7(2), 181-190.
-
(2007)
IJCSNS International Journal of Computer Science and Network Security
, vol.7
, Issue.2
, pp. 181-190
-
-
Omary, F.1
Tragha, A.2
Bellaachia, A.3
Mouloudi, A.4
-
18
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems. Commun. assoc
-
Rivest, R. L., Shamir, A., and Adleman, L. (1978). A method for obtaining digital signatures and public key cryptosystems. Commun. Assoc. Comput, 21(2), 120-126.
-
(1978)
Comput
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
19
-
-
34247250206
-
Genetic algorithms inspired cryptography
-
Series D: Computer Science and Statistics
-
Tragha, A., Omary, F., and Kriouile, A. (2005, November). Genetic algorithms inspired cryptography. A.M.S.E Association for the Advancement of Modeling & Simulation Techniques in Enterprises, Series D: Computer Science and Statistics.
-
(2005)
A.M.S.E Association for the Advancement of Modeling & Simulation Techniques in Enterprises
-
-
Tragha, A.1
Omary, F.2
Kriouile, A.3
-
20
-
-
34247266636
-
-
Korea, November
-
Tragha, A., Omary, F., and Mouloudi, A. (2006). ICIGA: Improved cryptography inspired by genetic algorithms. 2006 International Conference on Hybrid Information Technology (ICHIT'06). Choju Island, Korea, November 9-11.
-
(2006)
ICIGA: Improved Cryptography Inspired by Genetic Algorithms. 2006 International Conference on Hybrid Information Technology (ICHIT'06). Choju Island
, pp. 9-11
-
-
Tragha, A.1
Omary, F.2
Mouloudi, A.3
-
23
-
-
1342275514
-
A surve' of chaotic secure communication systems
-
Yang, T. (2004). A surve' of chaotic secure communication systems. Int. J. Comput. Cognit., 2, 81-130.
-
(2004)
Int. J. Comput. Cognit.
, vol.2
, pp. 81-130
-
-
Yang, T.1
|