-
1
-
-
0343689904
-
Synchronization in chaotic systems
-
Pecora LM, Carroll TL. Synchronization in chaotic systems. Phys Rev Lett 1990;64:821-4.
-
(1990)
Phys Rev Lett
, vol.64
, pp. 821-824
-
-
Pecora, L.M.1
Carroll, T.L.2
-
2
-
-
4243997232
-
Extracting messages masked by chaos
-
Perez G, Cerdeira HA. Extracting messages masked by chaos. Phys Rev Lett 1995;74:1970-3.
-
(1995)
Phys Rev Lett
, vol.74
, pp. 1970-1973
-
-
Perez, G.1
Cerdeira, H.A.2
-
3
-
-
0008088350
-
Steps toward unmasking secure communication
-
Short K. Steps toward unmasking secure communication. Int J Bifurcat Chaos 1994;4:959-77.
-
(1994)
Int J Bifurcat Chaos
, vol.4
, pp. 959-977
-
-
Short, K.1
-
4
-
-
0037302727
-
Chosen ciphertext attack on chaos communication based on chaotic synchronization
-
Guojie H, Zhengjin F, Ruiling M. Chosen ciphertext attack on chaos communication based on chaotic synchronization. IEEE Trans Circuits Syst I 2003;50:275-9.
-
(2003)
IEEE Trans Circuits Syst I
, vol.50
, pp. 275-279
-
-
Guojie, H.1
Zhengjin, F.2
Ruiling, M.3
-
5
-
-
0042786512
-
Cryptography with chaos
-
Baptista MS. Cryptography with chaos. Phys Lett A 1998;240:50-4.
-
(1998)
Phys Lett A
, vol.240
, pp. 50-54
-
-
Baptista, M.S.1
-
7
-
-
0037053849
-
A fast chaotic cryptographic scheme with dynamic look-up table
-
Wong KW. A fast chaotic cryptographic scheme with dynamic look-up table. Phys Lett A 2002;298:238-42.
-
(2002)
Phys Lett A
, vol.298
, pp. 238-242
-
-
Wong, K.W.1
-
8
-
-
2442684584
-
A combined chaotic cryptographic and hashing scheme
-
Wong K-W. A combined chaotic cryptographic and hashing scheme. Phys Lett A 2003;307:292-8.
-
(2003)
Phys Lett A
, vol.307
, pp. 292-298
-
-
Wong, K.-W.1
-
9
-
-
0037424907
-
A chaotic cryptography scheme for generating short ciphertext
-
Wong K-W, Ho S-W, Yung C-K. A chaotic cryptography scheme for generating short ciphertext. Phys Lett A 2003;310:67-73.
-
(2003)
Phys Lett A
, vol.310
, pp. 67-73
-
-
Wong, K.-W.1
Ho, S.-W.2
Yung, C.-K.3
-
10
-
-
0005205415
-
Analysis of some recently proposed chaos-based encryption algorithms
-
Jakimoski G, Kocarev L. Analysis of some recently proposed chaos-based encryption algorithms. Phys Lett A 2001;291:381-4.
-
(2001)
Phys Lett A
, vol.291
, pp. 381-384
-
-
Jakimoski, G.1
Kocarev, L.2
-
13
-
-
2442662577
-
Cryptanalysis of dynamic look-up table based chaotic cryptosystems
-
Alvarez G, Montoya F, Romera M, Pastor G. Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys Lett A 2004;326:211-8.
-
(2004)
Phys Lett A
, vol.326
, pp. 211-218
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
14
-
-
84892526019
-
Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseude-random coding
-
Cryptography and Coding 2001. . Berlin Heidelberg: Springer-Verlag
-
Li S, Li Q, Li W, Mou X, Cai Y. Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseude-random coding. In: Cryptography and Coding 2001. LNCS, vol. 2260. Berlin Heidelberg: Springer-Verlag; 2001. p. 205-21.
-
(2001)
LNCS
, vol.2260
, pp. 205-221
-
-
Li, S.1
Li, Q.2
Li, W.3
Mou, X.4
Cai, Y.5
-
15
-
-
0038285043
-
On the security of a chaotic encryption scheme: Problems with computerized chaos in finite computing precision
-
Li S, Mou X, Cai Y, Ji Z, Zhang J. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Comput Phys Commun 2003;153:52-8.
-
(2003)
Comput Phys Commun
, vol.153
, pp. 52-58
-
-
Li, S.1
Mou, X.2
Cai, Y.3
Ji, Z.4
Zhang, J.5
-
16
-
-
0032050353
-
Perturbance-based algorithm to expand cycle length of chaotic key stream
-
Tao S, Ruli W, Yixun Y. Perturbance-based algorithm to expand cycle length of chaotic key stream. Electron Lett 1998;34:873-4.
-
(1998)
Electron Lett
, vol.34
, pp. 873-874
-
-
Tao, S.1
Ruli, W.2
Yixun, Y.3
|