메뉴 건너뛰기




Volumn 18, Issue 6, 2009, Pages 306-315

Overview of information security using genetic algorithm and chaos

Author keywords

Chaos; Cryptography; Genetic algorithms

Indexed keywords


EID: 84863964680     PISSN: 19393555     EISSN: 19393547     Source Type: Journal    
DOI: 10.1080/19393550903327558     Document Type: Article
Times cited : (28)

References (23)
  • 1
    • 0037421353 scopus 로고    scopus 로고
    • Cryptanalysis of a chaotic secure communication system
    • Alvarez, G., Montoya, F., Romera, M., and Pastor, G. (2003). Cryptanalysis of a chaotic secure communication system. Phys. Lett. A, 306(4), 200-205.
    • (2003) Phys. Lett. A , vol.306 , Issue.4 , pp. 200-205
    • Alvarez, G.1    Montoya, F.2    Romera, M.3    Pastor, G.4
  • 2
    • 0345303927 scopus 로고    scopus 로고
    • Cryptanalysis of a discrete chaotic cryptosystem using external key
    • Alvarez, G., Montoya, F., Romera, M., and Pastor, G. (2003). Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys. Lett. A, 319, 334-339.
    • (2003) Phys. Lett. A , vol.319 , pp. 334-339
    • Alvarez, G.1    Montoya, F.2    Romera, M.3    Pastor, G.4
  • 3
    • 0039333597 scopus 로고    scopus 로고
    • Clarifying chaos: Examples and counterexamples
    • Brown, R. and Chua, L. O. (1996). Clarifying chaos: Examples and counterexamples. Int. J. Bifurcation and Chaos, 6(2), 219-249.
    • (1996) Int. J. Bifurcation and Chaos , vol.6 , Issue.2 , pp. 219-249
    • Brown, R.1    Chua, L.O.2
  • 7
    • 0032089417 scopus 로고    scopus 로고
    • Symmetric ciphers based on two-dimensional chaotic maps
    • Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation and Chaos, 8, 1259-1284.
    • (1998) Int. J. Bifurcation and Chaos , vol.8 , pp. 1259-1284
    • Fridrich, J.1
  • 10
    • 33749632318 scopus 로고    scopus 로고
    • Image encryption using genetic algorithm
    • Husainy, M. (2006). Image encryption using genetic algorithm. Information Technology Journal, 5(3), 516-519.
    • (2006) Information Technology Journal , vol.5 , Issue.3 , pp. 516-519
    • Husainy, M.1
  • 11
    • 51849099850 scopus 로고    scopus 로고
    • Application of genetic algorithm in the field of steganography
    • July-December)
    • Kumar, A. and Rajpal, N. (2004, July-December). Application of genetic algorithm in the field of steganography. Journal of Information Technology, 2(1), 12-15.
    • (2004) Journal of Information Technology , vol.2 , Issue.1 , pp. 12-15
    • Kumar, A.1    Rajpal, N.2
  • 13
    • 18244420943 scopus 로고    scopus 로고
    • Improving security of a chaotic encryption approach
    • Li, S., Mou, X., and Cai, Y. (2001). Improving security of a chaotic encryption approach. Phys. Lett. A, 290(3-4), 127-133.
    • (2001) Phys. Lett. A , vol.290 , Issue.3-4 , pp. 127-133
    • Li, S.1    Mou, X.2    Cai, Y.3
  • 14
    • 0038285043 scopus 로고    scopus 로고
    • On the security of a chaotic encryption scheme: Problems with computerized chaos in finite computing precision
    • Li, S., Mou, X., Cai, Y., Ji, Z., and Zhang, J. (2003). On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Comput. Phys. Commun., 153, 52-58.
    • (2003) Comput. Phys. Commun. , vol.153 , pp. 52-58
    • Li, S.1    Mou, X.2    Cai, Y.3    Ji, Z.4    Zhang, J.5
  • 15
    • 21344497984 scopus 로고
    • Secure communications via chaotic synchronization. Ii. noise reduction by cascading two identical receivers
    • Lozi, R. and Chua, L. O. (1993). Secure communications via chaotic synchronization. II. Noise reduction by cascading two identical receivers. Int. J. Bifurcation and Chaos, 3(5), 1319-1325.
    • (1993) Int. J. Bifurcation and Chaos , vol.3 , Issue.5 , pp. 1319-1325
    • Lozi, R.1    Chua, L.O.2
  • 18
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems. Commun. assoc
    • Rivest, R. L., Shamir, A., and Adleman, L. (1978). A method for obtaining digital signatures and public key cryptosystems. Commun. Assoc. Comput, 21(2), 120-126.
    • (1978) Comput , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 23
    • 1342275514 scopus 로고    scopus 로고
    • A surve' of chaotic secure communication systems
    • Yang, T. (2004). A surve' of chaotic secure communication systems. Int. J. Comput. Cognit., 2, 81-130.
    • (2004) Int. J. Comput. Cognit. , vol.2 , pp. 81-130
    • Yang, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.