Chaos-Based Public-Key Cryptography
暂无分享,去创建一个
[1] K. Aihara,et al. Cryptosystems with discretized chaotic maps , 2002 .
[2] L. Kocarev,et al. Chaos-based random number generators. Part II: practical realization , 2001 .
[3] Andrea Gerosa,et al. A fully integrated chaotic system for the generation of truly random numbers , 2002 .
[4] Nikolai F. Rulkov,et al. Chaotic pulse position modulation: a robust method of communicating with chaos , 2000, IEEE Communications Letters.
[5] Franz Pichler,et al. Computer Aided Systems Theory — EUROCAST '95 , 1995, Lecture Notes in Computer Science.
[6] Xiaofeng Liao,et al. Using Chebyshev chaotic map to construct infinite length hash chains , 2004, 2004 International Conference on Communications, Circuits and Systems (IEEE Cat. No.04EX914).
[7] L. Kocarev,et al. Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .
[8] W. Schwarz,et al. Chaos and cryptography , 2001 .
[9] Edmund Taylor Whittaker,et al. A Course of Modern Analysis , 2021 .
[10] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[11] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[12] Ljupco Kocarev,et al. Public-key encryption based on Chebyshev maps , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[13] Ljupco Kocarev,et al. Differential and linear probabilities of a block-encryption cipher , 2003 .
[14] T. Kohda,et al. Statistics of chaotic binary sequences , 1997, IEEE Trans. Inf. Theory.
[15] E. W. Ng. Symbolic and Algebraic Computation , 1979, Lecture Notes in Computer Science.
[16] Daniel D. Wheeler,et al. Supercomputer Investigations of a Chaotic Encryption Algorithm , 1991, Cryptologia.
[17] Tohru Kohda,et al. Jacobian elliptic Chebyshev rational maps , 2001 .
[18] J. Alvin Connelly,et al. A noise-based IC random number generator for applications in cryptography , 2000 .
[19] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[20] Franz Pichler,et al. Finite Dimensional Generalized Baker Dynamical Systems for Cryptographic Applications , 1995, EUROCAST.
[21] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[22] Alfredo De Santis,et al. Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.
[23] Ken Umeno,et al. Exactly Solvable Chaos and Addition Theorems of Elliptic Functions (Applied Mathematics of Discrete Integrable Systems) , 1997, chao-dyn/9704007.
[24] L. Kocarev,et al. Pseudorandom bits generated by chaotic maps , 2003 .
[25] Helmut Hasse,et al. Number Theory , 2020, An Introduction to Probabilistic Number Theory.
[26] E. L. Wachspress. Evaluating elliptic functions and their inverses , 2000 .
[27] Harvey Cohn,et al. A second course in number theory , 1962 .
[28] Ken Umeno,et al. METHOD OF CONSTRUCTING EXACTLY SOLVABLE CHAOS , 1996, chao-dyn/9610009.
[29] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[30] Irene A. Stegun,et al. Handbook of Mathematical Functions. , 1966 .
[31] T. J. Rivlin. Chebyshev polynomials : from approximation theory to algebra and number theory , 1990 .
[32] Ljupco Kocarev,et al. Public-Key Encryption Based on Chebyshev Polynomials , 2005 .
[33] Michael Peter Kennedy,et al. FM-DCSK: a novel method for chaotic communications , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).
[34] L. Kocarev,et al. Chaos-based random number generators-part I: analysis [cryptography] , 2001 .
[35] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[36] Donald E. Knuth,et al. The art of computer programming, volume 3: (2nd ed.) sorting and searching , 1998 .
[37] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[38] T. J. Rivlin. The Chebyshev polynomials , 1974 .
[39] Daniel D. Wheeler,et al. Problems with Chaotic Cryptosystems , 1989, Cryptologia.
[40] Robert A. J. Matthews,et al. On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.
[41] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[42] S. D. Dhodapkar,et al. CHAOS BASED CRYPTOGRAPHY : A NEW APPROACH TO SECURE COMMUNICATIONS , 2005 .
[43] Richard J. Fateman,et al. Lookup tables, recurrences and complexity , 1989, ISSAC '89.
[44] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[45] I. Percival,et al. Arithmetical properties of strongly chaotic motions , 1987 .