High-performance multimedia encryption system based on chaos.
暂无分享,去创建一个
[1] K. Wong,et al. A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .
[2] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[3] A. Palacios,et al. Cryptography with cycling chaos , 2002 .
[4] Kwok-Wo Wong,et al. Baptista-type chaotic cryptosystems: problems and countermeasures , 2004, Physics Letters A.
[5] Jiun-In Guo,et al. New voice over Internet protocol technique with hierarchical data security protection , 2002 .
[6] X. Liao,et al. A More Secure Chaotic Cryptographic Scheme Based on the Dynamic Look-Up Table , 2005 .
[7] W. Schwarz,et al. Chaos and cryptography , 2001 .
[8] J. Cernák. Digital generators of chaos , 1996 .
[9] S. Li,et al. Breaking an encryption scheme based on chaotic baker map , 2004, Physics Letters.
[10] Binder,et al. Simulating chaotic behavior with finite-state machines. , 1986, Physical review. A, General physics.
[11] Gonzalo Alvarez,et al. Chaotic cryptosystems , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[12] X. Mou,et al. Performance analysis of Jakimoski–Kocarev attack on a class of chaotic cryptosystems , 2003 .
[13] Eli Biham,et al. Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91 , 1991, EUROCRYPT.
[14] Michael Dellnitz,et al. Cycling chaos , 1995 .
[15] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[16] G. Álvarez,et al. Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .
[17] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[18] Shujun Li,et al. Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[19] Xuanqin Mou,et al. Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.
[20] M. Baptista. Cryptography with chaos , 1998 .
[21] X. Mou,et al. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .
[22] Robert A. J. Matthews,et al. On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.
[23] Sang Tao,et al. Perturbance-based algorithm to expand cycle length of chaotic key stream , 1998 .
[24] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[25] Guanrong Chen,et al. Cryptanalysis of a data security protection scheme for VoIP , 2006 .
[26] L. Kocarev,et al. Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .
[27] H. Atmanspacher,et al. Characterizing spontaneous irregular behavior in coupled map lattices , 2005 .
[28] Ljupco Kocarev,et al. Analysis of some recently proposed chaos-based encryption algo-rithms , 2001 .
[29] Vinod Patidar,et al. Discrete chaotic cryptography using external key , 2003 .