LoBa128, a Lorenz-based PRNG for wireless sensor networks
暂无分享,去创建一个
[1] John M. Carroll,et al. Chaos in Cryptography: the Escape from the Strange Attractor , 1992, Cryptologia.
[2] Robert A. J. Matthews,et al. On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.
[3] Maxim Raya,et al. The security of vehicular ad hoc networks , 2005, SASN '05.
[4] Ta-lun Yang,et al. Breaking chaotic switching using generalized synchronization: examples , 1998 .
[5] Qurban A. Memon. Synchronized chaos for network security , 2003, Comput. Commun..
[6] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[7] Anastasios Bezerianos,et al. Secure Communication with Chaotic Systems of Difference Equations , 1997, IEEE Trans. Computers.
[8] Mohamed Eltoweissy,et al. Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.
[9] Xuanqin Mou,et al. Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.
[10] Miguel Romera,et al. Cryptanalyzing a discrete-time chaos synchronization secure communication system , 2003, nlin/0311046.
[11] Pérez,et al. Extracting messages masked by chaos. , 1995, Physical review letters.
[12] Zbigniew Kotulski,et al. Discrete chaotic cryptography , 1997 .
[13] Carroll,et al. Synchronization in chaotic systems. , 1990, Physical review letters.
[14] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[15] Mieczyslaw Jessa,et al. Data encryption algorithms using one-dimensional chaotic maps , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).
[16] S. Shankar Sastry,et al. Distributed Environmental Monitoring Using Random Sensor Networks , 2003, IPSN.
[17] Richard Beckwith,et al. Report from the field: results from an agricultural wireless sensor network , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[18] Sang Tao,et al. Perturbance-based algorithm to expand cycle length of chaotic key stream , 1998 .
[19] W. Schwarz,et al. Chaos and cryptography , 2001 .
[20] R.M.S. Silva,et al. Applicability Drawbacks of Probabilistic Key Management Schemes for Real World Applications of Wireless Sensor Networks , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).
[21] H. Feistel. Cryptography and Computer Privacy , 1973 .
[22] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[23] Gang Hu,et al. Chaos-based secure communications in a large community. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[24] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[25] L. Kocarev,et al. Pseudorandom bits generated by chaotic maps , 2003 .
[26] Daniel D. Wheeler,et al. Supercomputer Investigations of a Chaotic Encryption Algorithm , 1991, Cryptologia.
[27] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .