Mathematical Treatment for Constructing a countermeasure against the one time pad attack on the Baptista Type Cryptosystem
暂无分享,去创建一个
[1] X. Mou,et al. Improving security of a chaotic encryption approach , 2001, Physics Letters A.
[2] K. Wong,et al. A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .
[3] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[4] G. Álvarez,et al. Cryptanalysis of an ergodic chaotic cipher , 2003 .
[5] Yu-Huang Chu,et al. Dynamic data encryption system based on synchronised chaotic systems , 1999 .
[6] Kwok-wo Wong,et al. A modified chaotic cryptographic method , 2001 .
[7] Mohammad Jafar Tarokh,et al. A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents , 2009, Int. J. Inf. Secur. Priv..
[8] G. Álvarez,et al. Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .
[9] G. Álvarez,et al. Cryptanalysis of a chaotic encryption system , 2000 .
[10] Daniel Sanz,et al. Integrating Access Policies into the Development Process of Hypermedia Web Systems , 2006 .
[11] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[12] E. Alvarez,et al. New approach to chaotic encryption , 1999 .
[13] Kwok-Wo Wong,et al. A chaotic cryptography scheme for generating short ciphertext , 2003 .
[14] Kwok-Wo Wong,et al. Baptista-type chaotic cryptosystems: problems and countermeasures , 2004, Physics Letters A.
[15] A. Palacios,et al. Cryptography with cycling chaos , 2002 .
[16] Ljupco Kocarev,et al. Analysis of some recently proposed chaos-based encryption algo-rithms , 2001 .
[17] Vinod Patidar,et al. Discrete chaotic cryptography using external key , 2003 .
[18] P. García,et al. Communication through chaotic map systems , 2002 .
[19] Kwok-Wo Wong,et al. A combined chaotic cryptographic and hashing scheme , 2003 .
[20] G. Álvarez,et al. Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.
[21] Hamid R. Nemati,et al. Information Security and Ethics: Concepts, Methodologies, Tools and Applications , 2008 .
[22] M. Baptista. Cryptography with chaos , 1998 .
[23] Saverio Mascolo,et al. Observer design for cryptography based on hyperchaotic oscillators , 1998 .
[24] Hamid R. Nemati. International Journal of Information Security and Privacy , 2007 .
[25] Gonzalo Alvarez,et al. Cryptanalysis of a chaotic secure communication system , 2003 .
[26] Wasim A. Al-Hamdani,et al. Three Models to Measure Information Security Compliance , 2009, Int. J. Inf. Secur. Priv..
[27] X. Mou,et al. Performance analysis of Jakimoski–Kocarev attack on a class of chaotic cryptosystems , 2003 .