暂无分享,去创建一个
Jacques M. Bahi | Christophe Guyeux | Jean-François Couchot | J. Bahi | C. Guyeux | Jean-François Couchot
[1] Jacques M. Bahi,et al. Chaotic Iterations versus Spread-Spectrum: Chaos and Stego Security , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[2] W. Xiaomin,et al. One way Hash function construction based on the extended chaotic maps switch , 2003 .
[3] Jacques M. Bahi,et al. An Improved Watermarking Scheme for Internet Applications , 2010, 2010 2nd International Conference on Evolving Internet.
[4] Josef Pieprzyk,et al. Keyed Hash Functions , 1995, Cryptography: Policy and Algorithms.
[5] Wei Guo,et al. Cryptanalysis on a parallel keyed hash function based on chaotic maps , 2009 .
[6] Jacques M. Bahi,et al. Randomness Quality of CI Chaotic Generators: Applications to Internet Security , 2010, 2010 2nd International Conference on Evolving Internet.
[7] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[8] Yong Wang,et al. Improving the security of a parallel keyed hash function based on chaotic maps , 2009 .
[9] Wenfang Zhang,et al. Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .
[10] Chang-song Zhou,et al. Extracting information masked by chaos and contaminated with noise: Some considerations on the security of communication approaches using chaos , 1997 .
[11] Christophe Guyeux,et al. An improved watermarking algorithm for Internet applications , 2010 .
[12] Yong Wang,et al. Parallel keyed hash function construction based on chaotic neural network , 2009, Neurocomputing.
[13] Xiaofeng Liao,et al. A chaos-based hash function with both modification detection and localization capabilities , 2010 .
[14] Carsten Knudsen,et al. Chaos Without Nonperiodicity , 1994 .
[15] M. Bernhard. Introduction to Chaotic Dynamical Systems , 1992 .
[16] Christophe Guyeux,et al. Le désordre des itérations chaotiques et leur utilité en sécurité informatique. (The disorder of chaotic iterations and its use in the computer science security field) , 2010 .