Study of chaos functions for their suitability in generating Message Authentication Codes
暂无分享,去创建一个
[1] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[2] D. R. Frey,et al. Chaotic digital encoding: an approach to secure communication , 1993 .
[3] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[4] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[5] Bart Preneel. Cryptanalysis of Message Authentication Codes , 1997, ISW.
[6] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[7] Leon O. Chua,et al. Cryptography based on chaotic systems , 1997 .
[8] Henry Leung,et al. Secure communication using a chaos based signal encryption scheme , 2001, IEEE Trans. Consumer Electron..
[9] James Gleick,et al. Chaos, Making a New Science , 1987 .
[10] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[11] Melek D. Yücel,et al. Avalanche and Bit Independence Properties for the Ensembles of Randomly Chosen n \times n S-Boxes , 2001 .
[12] M. Baptista. Cryptography with chaos , 1998 .