Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption
暂无分享,去创建一个
Rui Yang | Yu-Guang Yang | Wei-Min Shi | Peng Xu | Yi-Hua Zhou | Yuguang Yang | Yihua Zhou | Rui Yang | Wei-Min shi | Peng Xu | Weimin Shi
[1] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[2] M. Jafarizadeh,et al. Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps , 2009 .
[3] Frédéric Magniez,et al. Quantum algorithms for the triangle problem , 2005, SODA '05.
[4] Qiang Li,et al. A hybrid classical-quantum clustering algorithm based on quantum walks , 2011, Quantum Inf. Process..
[5] Kevin Curran,et al. A hash-based image encryption algorithm , 2010 .
[6] Amir Akhavan,et al. A novel parallel hash function based on 3D chaotic map , 2013, EURASIP Journal on Advances in Signal Processing.
[7] Osvaldo A. Rosso,et al. Intensive statistical complexity measure of pseudorandom number generators , 2005 .
[8] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[9] C L Webber,et al. Dynamical assessment of physiological systems and states using recurrence plot strategies. , 1994, Journal of applied physiology.
[10] Jason Twamley,et al. Using a biased quantum random walk as a quantum lumped element router , 2014 .
[11] Jürgen Kurths,et al. Recurrence plots for the analysis of complex systems , 2009 .
[12] J. Zbilut,et al. Embeddings and delays as derived from quantification of recurrence plots , 1992 .
[13] Rolf Landauer,et al. A simple measure of complexity , 1988, Nature.
[14] Mohammad Eshghi,et al. Chaotic image encryption system using phase-magnitude transformation and pixel substitution , 2011, Telecommunication Systems.
[15] O A Rosso,et al. Distinguishing noise from chaos. , 2007, Physical review letters.
[16] Dario Tamascelli,et al. A quantum-walk-inspired adiabatic algorithm for solving graph isomorphism problems , 2014, 1401.1278.
[17] Andrew M. Childs,et al. Spatial search by continuous-time quantum walks on crystal lattices , 2014, 1403.2676.
[18] Hua Zhang,et al. Novel image encryption/decryption based on quantum Fourier transform and double phase encoding , 2013, Quantum Inf. Process..
[19] Ricardo López-Ruiz,et al. A Statistical Measure of Complexity , 1995, ArXiv.
[20] Zengqiang Chen,et al. A new image encryption algorithm based on hyper-chaos , 2008 .
[21] Rafael Benítez,et al. A wavelet-based tool for studying non-periodicity , 2010, Comput. Math. Appl..
[22] Jian Li,et al. Perfect state transfer and efficient quantum routing: a discrete-time quantum walk approach , 2014, 1405.6422.
[23] D. Ruelle,et al. Recurrence Plots of Dynamical Systems , 1987 .
[24] J. Kurths,et al. Recurrence-plot-based measures of complexity and their application to heart-rate-variability data. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[25] Xing-Yuan Wang,et al. Cryptanalysis on a parallel keyed hash function based on chaotic neural network , 2010, Neurocomputing.
[26] Hui Chen,et al. Discrete-time interacting quantum walks and quantum Hash schemes , 2013, Quantum Inf. Process..
[27] A. Akhavan,et al. An image encryption scheme based on quantum logistic map , 2012 .
[28] Osvaldo A. Rosso,et al. Statistical complexity and disequilibrium , 2003 .
[29] I. Jex,et al. Directional correlations in quantum walks with two particles , 2011, 1102.4445.
[30] Osvaldo A. Rosso,et al. Intensive entropic non-triviality measure , 2004 .
[31] Thierry Paul,et al. Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.
[32] K. Birgitta Whaley,et al. Quantum random-walk search algorithm , 2002, quant-ph/0210064.
[33] Amir Akhavan,et al. Pseudo random number generator based on quantum chaotic map , 2014, Commun. Nonlinear Sci. Numer. Simul..
[34] Pierre L'Ecuyer,et al. TestU01: A C library for empirical testing of random number generators , 2006, TOMS.
[35] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[36] Andris Ambainis,et al. Quantum walk algorithm for element distinctness , 2003, 45th Annual IEEE Symposium on Foundations of Computer Science.
[37] Yu-Guang Yang,et al. Novel Image Encryption based on Quantum Walks , 2015, Scientific Reports.
[38] B. Pompe,et al. Permutation entropy: a natural complexity measure for time series. , 2002, Physical review letters.
[39] Jingbo B. Wang,et al. pyCTQW: A continuous-time quantum walk simulator on distributed memory computers , 2015, Comput. Phys. Commun..
[40] Salvador Elías Venegas-Andraca,et al. Quantum walks: a comprehensive review , 2012, Quantum Information Processing.
[41] Wei Guo,et al. Cryptanalysis on a parallel keyed hash function based on chaotic maps , 2009 .
[42] Xiaoling Huang,et al. An image encryption algorithm based on hyper-chaos and DNA sequence , 2012, Multimedia Tools and Applications.
[43] Masato Koashi,et al. Unconditionally secure key distribution based on two nonorthogonal states. , 2003, Physical review letters.
[44] S. Mallat. A wavelet tour of signal processing , 1998 .
[45] Cristel Chandre,et al. Time–frequency analysis of chaotic systems , 2002, nlin/0209015.
[46] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[47] S. Mallat. VI – Wavelet zoom , 1999 .
[48] Wenfang Zhang,et al. Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .
[49] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.