Performance Analysis of Chaotic Encryption Using a Shared Image as a Key
暂无分享,去创建一个
[1] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[2] Nigel P. Smart,et al. Cryptography: An Introduction , 2004 .
[3] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[4] Jinhu Lu,et al. Generating multi-scroll chaotic attractors by thresholding , 2008 .
[5] William Stallings,et al. Data and Computer Communications , 1985 .
[6] Xinghuo Yu,et al. Generating 3-D multi-scroll chaotic attractors: A hysteresis series switching method , 2004, Autom..
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Man Young Rhee,et al. Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .
[9] Charles P. Pfleeger,et al. Security in computing , 1988 .
[10] Xinghuo Yu,et al. Fingerprint images encryption via multi-scroll chaotic attractors , 2007, Appl. Math. Comput..
[11] Xinghuo Yu,et al. Generating multi-scroll chaotic attractors via a linear second-order hysteresis system , 2005 .
[12] Raj Jain,et al. The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.
[13] Sagar Naik,et al. Software Implementation Strategies for Power-Conscious Systems , 2001, Mob. Networks Appl..
[14] F. Han,et al. A new way of generating grid-scroll chaos and its application to biometric authentication , 2005, 31st Annual Conference of IEEE Industrial Electronics Society, 2005. IECON 2005..