Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption
暂无分享,去创建一个
[1] Zbigniew Kotulski,et al. Discrete chaotic cryptography ( DCC ) . New method for secure communication , 2001 .
[2] J. Fridrich. Image encryption based on chaotic maps , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.
[3] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[4] R A Williamson. REMOTE SENSING AND TRANSPORTATION SECURITY , 2002 .
[5] N. Bourbakis,et al. SCAN-Based Compression-Encryption-Hiding for Video on Demand , 2003, IEEE Multim..
[6] Máire O'Neill,et al. Rijndael FPGA Implementations Utilising Look-Up Tables , 2003, J. VLSI Signal Process..
[7] Zbigniew Kotulski,et al. Discrete chaotic cryptography , 1997 .
[8] Matti Tommiska,et al. A fully pipelined memoryless 17.8 Gbps AES-128 encryptor , 2003, FPGA '03.
[9] Kris Gaj,et al. Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays , 2001, CT-RSA.
[10] Kwok-Wo Wong,et al. A chaotic cryptography scheme for generating short ciphertext , 2003 .
[11] Vinod Patidar,et al. Discrete chaotic cryptography using external key , 2003 .
[12] E. Alvarez,et al. New approach to chaotic encryption , 1999 .
[13] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[14] Donald W. Davies,et al. Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.
[15] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[16] M.Z.H. Sarker,et al. A Cost Effective Symmetric Key Cryptographic Algorithm for Small Amount of Data , 2005, 2005 Pakistan Section Multitopic Conference.
[17] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[18] A. Akhavan,et al. A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .
[19] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[20] X. Liao,et al. A novel block cryptosystem based on iterating a chaotic map , 2006 .
[21] Iwao Sasase,et al. A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.
[22] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[23] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[24] M. Baptista. Cryptography with chaos , 1998 .
[25] M. Usama,et al. Classical and chaotic encryption techniques for the security of satellite images , 2008, 2008 International Symposium on Biometrics and Security Technologies.
[26] Douglas R. Stinson,et al. Cryptography: Theory and Practice,Second Edition , 2002 .
[27] Z. Kotulski,et al. APPLICATION OF DISCRETE CHAOTIC DYNAMICAL SYSTEMS IN CRYPTOGRAPHY — DCC METHOD , 1999 .
[28] K. Wong,et al. A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .
[29] Xuanqin Mou,et al. Chaotic encryption scheme for real-time digital video , 2002, IS&T/SPIE Electronic Imaging.
[30] Jinsheng Sun,et al. A block cipher based on a suitable use of the chaotic standard map , 2005 .
[31] Robert A. J. Matthews,et al. On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.
[32] Ingrid Verbauwhede,et al. A 21.54 Gbits/s fully pipelined AES processor on FPGA , 2004, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.
[33] X. Mou,et al. Improving security of a chaotic encryption approach , 2001, Physics Letters A.
[34] Zhong-Ping Jiang,et al. A note on chaotic secure communication systems , 2002 .
[35] K. Wong,et al. A Modified Chaotic Cryptographic Method , 2001, Communications and Multimedia Security.