A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks
暂无分享,去创建一个
[1] Gilles Brassard,et al. Modern cryptology , 2006 .
[2] Jennifer Seberry,et al. Cryptography - an introduction to computer security , 1991, Advances in computer science series.
[3] J J Hopfield,et al. Neural networks and physical systems with emergent collective computational abilities. , 1982, Proceedings of the National Academy of Sciences of the United States of America.
[4] Lee-Ming Cheng,et al. Configurable nonlinear filter generator , 1998 .
[5] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[6] Marco Tomassini,et al. Cryptography with cellular automata , 2001, Appl. Soft Comput..
[7] Santosh S. Venkatesh,et al. The capacity of the Hopfield associative memory , 1987, IEEE Trans. Inf. Theory.
[8] James L. Massey,et al. A spectral characterization of correlation-immune combining functions , 1988, IEEE Trans. Inf. Theory.
[9] D. Amit,et al. Statistical mechanics of neural networks near saturation , 1987 .
[10] W S McCulloch,et al. A logical calculus of the ideas immanent in nervous activity , 1990, The Philosophy of Artificial Intelligence.
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Toshinobu Kaneko,et al. Dynamic Swapping Schemes and Differential Cryptanalysis (Special Section on Information Theory and Its Applications) , 1994 .
[13] E. Gardner,et al. Maximum Storage Capacity in Neural Networks , 1987 .
[14] Sommers,et al. Chaos in random neural networks. , 1988, Physical review letters.
[15] John J. Hopfield,et al. Neural networks and physical systems with emergent collective computational abilities , 1999 .
[16] Martin E. Hellman,et al. On the security of multiple encryption , 1981, CACM.
[17] Martin E. Hellman,et al. An extension of the Shannon theory approach to cryptography , 1977, IEEE Trans. Inf. Theory.
[18] Stephen Wolfram. Cryptography with Cellular Automata , 1985, CRYPTO.
[19] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[20] Rainer A. Rueppel,et al. Products of linear recurring sequences with maximum complexity , 1987, IEEE Trans. Inf. Theory.
[21] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[22] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.