Color image encryption based on one-time keys and robust chaotic maps
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[3] Vinod Patidar,et al. Image encryption using chaotic logistic map , 2006, Image Vis. Comput..
[4] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[5] Xiaogang Wu,et al. Parameter estimation only from the symbolic sequences generated by chaos system , 2004 .
[6] A. Pisarchik,et al. Image encryption with chaotically coupled chaotic maps , 2008 .
[7] M. Baptista. Cryptography with chaos , 1998 .
[8] Guanrong Chen,et al. A stream cipher based on a spatiotemporal chaotic system , 2007 .
[9] Xingyuan Wang,et al. Cryptanalysis and improvement on a cryptosystem based on a chaotic map , 2009, Comput. Math. Appl..
[10] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[11] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[12] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[13] Kwok-Wo Wong,et al. A true random number generator based on mouse movement and chaotic cryptography , 2009 .
[14] E. Alvarez,et al. New approach to chaotic encryption , 1999 .
[15] Carlos Cid,et al. Recent developments in cryptographic hash functions: Security implications and future directions , 2006, Inf. Secur. Tech. Rep..
[16] X. Liao,et al. A novel block cryptosystem based on iterating a chaotic map , 2006 .
[17] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[18] Ljupco Kocarev,et al. Theory and practice of chaotic cryptography , 2007 .
[19] Eric Thompson. MD5 collisions and the impact on computer forensics , 2005, Digit. Investig..
[20] Safya Belghith,et al. OCML-based colour image encryption , 2009 .