Real-Time Symmetric Cryptography using Quaternion Julia Set
暂无分享,去创建一个
[1] Bruce Schneier,et al. Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES , 1996, CRYPTO.
[2] John C. Hart,et al. Visualizing quaternion rotation , 1994, TOGS.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[5] Louis H. Kauffman,et al. Hypercomplex Iterations: Distance Estimation and Higher Dimensional Fractals , 2002 .
[6] Thomas E. Price,et al. Julia sets and the Mandelbrot set , 2009 .
[7] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] A. Samsudin,et al. New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets , 2007 .
[10] H. L. Hime. “The Elements of Quaternions” , 1894, Nature.
[11] William Rowan Hamilton,et al. Elements of Quaternions , 1969 .
[12] J. Milnor,et al. Dynamics in One Complex Variable: Introductory Lectures , 2000 .
[13] Sung-Ming Yen. Cryptanalysis of an authentication and key distribution protocol , 1999, IEEE Commun. Lett..
[14] Chung-Huang Yang,et al. Pseudorandom bit generators in stream-cipher cryptography , 1991, Computer.
[15] Bruce Schneier,et al. Key-Schedule Cryptanalysis of DEAL , 1999, Selected Areas in Cryptography.
[16] Manuel Blum,et al. A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..
[17] Fuzhen Zhang. Quaternions and matrices of quaternions , 1997 .
[18] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[19] A. Douady. Julia Sets and the Mandelbrot Set , 1986 .
[20] Burton S. Kaliski. A survey of encryption standards , 1993, IEEE Micro.