Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks
暂无分享,去创建一个
[1] Muhammad Khurram Khan,et al. Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals , 2010, Digit. Signal Process..
[2] Kwok-Wo Wong,et al. A combined chaotic cryptographic and hashing scheme , 2003 .
[3] Tao Xiang,et al. Cryptanalysis of a chaos block cipher for wireless sensor network , 2011 .
[4] Rhouma Rhouma,et al. Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem , 2008 .
[5] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[6] Tamar Frankel. [The theory and the practice...]. , 2001, Tijdschrift voor diergeneeskunde.
[7] P. García,et al. Communication through chaotic map systems , 2002 .
[8] X. Liao,et al. Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map , 2007 .
[9] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[10] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[11] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[12] Gonzalo Alvarez,et al. Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations , 2006, nlin/0611017.
[13] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[14] Muhammad Khurram Khan,et al. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.
[15] M. Baptista. Cryptography with chaos , 1998 .
[16] X. Liao,et al. A novel block cryptosystem based on iterating a chaotic map , 2006 .
[17] K. Wong,et al. A Modified Chaotic Cryptographic Method , 2001, Communications and Multimedia Security.