Efficiency Analysis for Public Key Systems Based on Fractal Functions
暂无分享,去创建一个
[1] Eun-Jun Yoon,et al. A New Key Agreement Protocol Based on Chaotic Maps , 2008, KES-AMSTA.
[2] Alfredo De Santis,et al. Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.
[3] Arnaud E. Jacquin,et al. Image coding based on a fractal theory of iterated contractive image transformations , 1992, IEEE Trans. Image Process..
[4] Ljupco Kocarev,et al. Public-key encryption with chaos. , 2004, Chaos.
[5] Ian Stewart,et al. Dynamical Systems and Fractals: Computer Graphics Experiments with Pascal , 1989 .
[6] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[7] Gonzalo Alvarez,et al. Security problems with a chaos-based deniable authentication scheme , 2004, nlin/0412023.
[8] Nadia M. G. Al-Saidi,et al. A New Approach in Cryptographic Systems Using Fractal Image Coding , 2009 .
[9] Ljupco Kocarev,et al. Public-Key Encryption Based on Chebyshev Polynomials , 2005 .
[10] IFS on the Multi-Fuzzy Fractal Space , 2009 .
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] S. Kumar,et al. Public Key Cryptographic System Using Mandelbrot Sets , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[13] P. Massopust. Fractal functions and their applications , 1997 .
[14] Michael F. Barnsley,et al. Fractals everywhere , 1988 .