Overview of Information Security Using Genetic Algorithm and Chaos
暂无分享,去创建一个
[1] L. Chua,et al. CLARIFYING CHAOS: EXAMPLES AND COUNTEREXAMPLES , 1996 .
[2] Leon O. Chua,et al. Secure Communications via Chaotic Synchronization II: Noise Reduction by Cascading Two Identical Receivers , 1993 .
[3] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[4] A F Mohammed Al-Husainy. Image Encryption Using Genetic Algorithm , 2006 .
[5] A. Tragha,et al. ICIGA: Improved Cryptography Inspired by Genetic Algorithms , 2006, 2006 International Conference on Hybrid Information Technology.
[6] Gonzalo Alvarez,et al. Cryptanalysis of a chaotic secure communication system , 2003 .
[7] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[8] Jan Awrejcewicz,et al. Bifurcation and Chaos , 1995 .
[9] X. Mou,et al. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .
[10] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[11] X. Mou,et al. Improving security of a chaotic encryption approach , 2001, Physics Letters A.
[12] C. Wu,et al. Studying chaos via 1-D maps-a tutorial , 1993 .
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[15] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[16] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[17] G. Álvarez,et al. Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .