A novel stream encryption scheme with avalanche effect
暂无分享,去创建一个
[1] Yuliang Zheng,et al. GAC - the Criterion for Global Avalance Characteristics of Cryptographic Functions , 1995, J. Univers. Comput. Sci..
[2] Gonzalo Alvarez,et al. Cryptanalysis of a discrete-time synchronous chaotic encryption system , 2008 .
[3] José María Sierra,et al. The strict avalanche criterion randomness test , 2005, Math. Comput. Simul..
[4] Annabelle Lee,et al. SP 800-29. A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2 , 2001 .
[5] H. Feistel. Cryptography and Computer Privacy , 1973 .
[6] Lequan Min,et al. Study on the Statistical Test for String Pseudorandom Number Generators , 2013, BICS.
[7] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[8] Adrian Skrobek. Cryptanalysis of chaotic stream cipher , 2007 .
[9] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[10] Solomon W. Golomb,et al. Shift Register Sequences , 1981 .
[11] Lequan Min,et al. A generalized synchronization theorem for discrete-time chaos system with application in data encryption scheme , 2007, 2007 International Conference on Communications, Circuits and Systems.
[12] Leon O. Chua,et al. Analytical Criteria for Local Activity of reaction-Diffusion CNN with Four State Variables and Applications to the Hodgkin-Huxley equation , 2000, Int. J. Bifurc. Chaos.
[13] Réjane Forré,et al. The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition , 1988, CRYPTO.
[14] Guanrong Chen,et al. YET ANOTHER CHAOTIC ATTRACTOR , 1999 .
[15] Yixian Yang,et al. An improved chaotic cryptosystem based on circular bit shift and XOR operations , 2012 .