-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon CE. Communication theory of secrecy systems. Bell Syst Tech J 1949;28:656-715.
-
(1949)
Bell Syst Tech J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
3
-
-
85020558749
-
An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks
-
New York: Springer-Verlag
-
Dawson M, Tavares SE. An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. In: Advances in cryptology: Proc of Eurocrypt'91. New York: Springer-Verlag; 1991. p. 352-67.
-
(1991)
Advances in Cryptology: Proc of Eurocrypt'91
, pp. 352-367
-
-
Dawson, M.1
Tavares, S.E.2
-
4
-
-
35148829532
-
Constructing large cryptographically strong S-boxes
-
Lecture notes in computer science
-
Detombe J, Tavares S. Constructing large cryptographically strong S-boxes. In: Advances in cryptology: Proc. of CRYPTO92. In: Lecture notes in computer science; 1992.
-
(1992)
Advances in Cryptology: Proc. of CRYPTO92
-
-
Detombe, J.1
Tavares, S.2
-
5
-
-
0008238518
-
The strict avalanche criterion: Spectral properties of Boolean functions and an extended definition
-
Berlin: Springer-Verlag
-
Forre R. The strict avalanche criterion: spectral properties of Boolean functions and an extended definition. In: Advances in cryptology: Proc of CRYPTO'88. Berlin: Springer-Verlag; 1989.
-
(1989)
Advances in Cryptology: Proc of CRYPTO'88
-
-
Forre, R.1
-
7
-
-
0025530315
-
The structured design of cryptographically good S-boxes
-
Adams C, Tavares S. The structured design of cryptographically good S-boxes. J Cryptol 1990;3(1):27-41.
-
(1990)
J Cryptol
, vol.3
, Issue.1
, pp. 27-41
-
-
Adams, C.1
Tavares, S.2
-
8
-
-
0031361712
-
A method for obtaining cryptographically strong 8 × 8 S-boxes
-
3-8 November New York: IEEE; 1997
-
Yi X, Cheng S, You X. A method for obtaining cryptographically strong 8 × 8 S-boxes. Global telecommunications conference, GLOBECOM'97, 3-8 November 1997, vol. 2. New York: IEEE; 1997. p. 689-93.
-
(1997)
Global Telecommunications Conference, GLOBECOM'97
, vol.2
, pp. 689-693
-
-
Yi, X.1
Cheng, S.2
You, X.3
-
9
-
-
0035250017
-
Chaos and cryptography: Block encryption ciphers
-
Jakimoski G, Kocarev L. Chaos and cryptography: block encryption ciphers. IEEE Trans Cire Syst - I 2001;48(2):163-70.
-
(2001)
IEEE Trans Cire Syst - I
, vol.48
, Issue.2
, pp. 163-170
-
-
Jakimoski, G.1
Kocarev, L.2
-
10
-
-
0242528365
-
Substitution cipher with pseudo-random shuffling: The dynamic substitution comber
-
Ritter T. Substitution cipher with pseudo-random shuffling: the dynamic substitution comber. Cryptologia 1990;14(4):289-303.
-
(1990)
Cryptologia
, vol.14
, Issue.4
, pp. 289-303
-
-
Ritter, T.1
-
11
-
-
9544243650
-
Transposition cipher with pseudo-random shuffling: The dynamic substitution comber
-
Ritter T. Transposition cipher with pseudo-random shuffling: the dynamic substitution comber. Cryptologia 1991;15(1):1-17.
-
(1991)
Cryptologia
, vol.15
, Issue.1
, pp. 1-17
-
-
Ritter, T.1
-
13
-
-
0037053849
-
A fast chaotic cryptographic scheme with dynamic lookup table
-
Wong K-W. A fast chaotic cryptographic scheme with dynamic lookup table. Phys Lett A 2002;298(4):238-42.
-
(2002)
Phys Lett A
, vol.298
, Issue.4
, pp. 238-242
-
-
Wong, K.-W.1
-
14
-
-
0032687653
-
A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks
-
Guo D, Cheng LM, Cheng LL. A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks. Appl Intell 1999;10(1):71-84.
-
(1999)
Appl Intell
, vol.10
, Issue.1
, pp. 71-84
-
-
Guo, D.1
Cheng, L.M.2
Cheng, L.L.3
-
15
-
-
0347031870
-
A cryptosystem based on cellular automata
-
Uis J, Ugalde E, Salazar G. A cryptosystem based on cellular automata. Chaos 1998;8(4):819-22.
-
(1998)
Chaos
, vol.8
, Issue.4
, pp. 819-822
-
-
Uis, J.1
Ugalde, E.2
Salazar, G.3
-
16
-
-
0036404061
-
Chaotic encryption scheme for real-time digital video
-
Li S, Zheng X, Mou X, Cai Y. Chaotic encryption scheme for real-time digital video. In: Real-time imaging VI. Proceedings of SPIE, vol. 4666. p. 149-60.
-
Real-time Imaging VI. Proceedings of SPIE
, vol.4666
, pp. 149-160
-
-
Li, S.1
Zheng, X.2
Mou, X.3
Cai, Y.4
-
17
-
-
0036123125
-
Cryptosystems with discretized chaotic maps
-
Masuda N, Aihara K. Cryptosystems with discretized chaotic maps. IEEE Trans Cire Syst - I 2002;49(1):28-40.
-
(2002)
IEEE Trans Cire Syst - I
, vol.49
, Issue.1
, pp. 28-40
-
-
Masuda, N.1
Aihara, K.2
-
19
-
-
0026397734
-
Differential cryptanalysis of DES-like cryptosystems
-
Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. J Cryptol 1991;4(1):3-72.
-
(1991)
J Cryptol
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
20
-
-
84950905409
-
Supercomputer investigations of a chaotic encryption algorithm
-
Wheeler DD, Matthews RAJ. Supercomputer investigations of a chaotic encryption algorithm. Cryptologia 1991;XV(2):140-51.
-
(1991)
Cryptologia
, vol.15
, Issue.2
, pp. 140-151
-
-
Wheeler, D.D.1
Raj, M.2
-
21
-
-
0031098928
-
Problems with the chaotic inverse system encryption approach
-
Zhou H, Ling X-T. Problems with the chaotic inverse system encryption approach. IEEE Trans Cire Syst - I 1997;44(3):268-71.
-
(1997)
IEEE Trans Cire Syst - I
, vol.44
, Issue.3
, pp. 268-271
-
-
Zhou, H.1
Ling, X.-T.2
-
22
-
-
0012584447
-
Problems with a probabilistic encryption scheme based on chaotic systems
-
Li S, Mou X, Yang BL, Ji Z, Zhang J. Problems with a probabilistic encryption scheme based on chaotic systems. Int J Bifurc Chaos 2003;11(10):3063-77.
-
(2003)
Int J Bifurc Chaos
, vol.11
, Issue.10
, pp. 3063-3077
-
-
Li, S.1
Mou, X.2
Yang, B.L.3
Ji, Z.4
Zhang, J.5
-
23
-
-
0036816840
-
Dynamical characteristics of discretized chaotic permutations
-
Masuda N, Aihara K. Dynamical characteristics of discretized chaotic permutations. Int J Bifurc Chaos 2002;12(10):2087-103.
-
(2002)
Int J Bifurc Chaos
, vol.12
, Issue.10
, pp. 2087-2103
-
-
Masuda, N.1
Aihara, K.2
-
24
-
-
7644238021
-
-
PhD thesis, School of Electronics & Information Engineering, Xi'an Jiaotong University, Xi'an, China
-
Li S. Analyses and new designs of digital chaotic ciphers. PhD thesis, School of Electronics & Information Engineering, Xi'an Jiaotong University, Xi'an, China. Available from: http://www.hooklee.com/pub.html.
-
Analyses and New Designs of Digital Chaotic Ciphers
-
-
Li, S.1
-
26
-
-
84893107930
-
A secret key cryptosystem by iterating a chaotic map
-
Advances in cryptology - EuroCrypt'91. Berlin: Spinger-Verlag
-
Habutsu T, Nishio Y. A secret key cryptosystem by iterating a chaotic map. In: Advances in cryptology - EuroCrypt'91. Lecture notes in computer science 0547. Berlin: Spinger-Verlag; 1991. p. 127-40.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 127-140
-
-
Habutsu, T.1
Nishio, Y.2
-
27
-
-
4243129231
-
A novel method for designing S-boxes based on chaotic maps
-
2005
-
Tang GP, Liao XF, Chen Y. A novel method for designing S-boxes based on chaotic maps. Chaos, Solitons & Fractals 2005;23:413-9.
-
Chaos, Solitons & Fractals
, vol.23
, pp. 413-419
-
-
Tang, G.P.1
Liao, X.F.2
Chen, Y.3
|