暂无分享,去创建一个
Chengqing Li | Yuansheng Liu | Hua Fan | Eric Yong Xie | Ge Cheng | Chengqing Li | Yuansheng Liu | Ge Cheng | Eric Yong Xie | Hua Fan
[1] Chengqing Li,et al. Cryptanalyzing image encryption using chaotic logistic map , 2013, Nonlinear Dynamics.
[2] M. Baptista. Cryptography with chaos , 1998 .
[3] Guanrong Chen,et al. A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.
[4] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[5] Nikolaos G. Bourbakis,et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..
[6] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[7] Phatak,et al. Logistic map: A possible random-number generator. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[8] Lih-Yuan Deng,et al. Period Extension and Randomness Enhancement Using High-Throughput Reseeding-Mixing PRNG , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[9] G. Álvarez,et al. Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.
[10] Leo Yu Zhang,et al. International Journal of Bifurcation and Chaos Breaking a Chaotic Image Encryption Algorithm Based on modulo Addition and Xor Operation , 2022 .
[11] Tao Xie,et al. Breaking a novel image encryption scheme based on improved hyperchaotic sequences , 2012, Nonlinear Dynamics.
[12] R. Povinelli,et al. Analyzing Logistic Map Pseudorandom Number Generators for Periodicity Induced by Finite Precision Floating-Point Representation , 2012 .
[13] Olcay Taner Yildiz,et al. Cryptanalysis of Fridrich's Chaotic Image Encryption , 2010, Int. J. Bifurc. Chaos.
[14] Jinhu Lu,et al. Design and ARM Platform-Based Realization of Digital Color Image Encryption and Decryption via Single State Variable Feedback Control , 2014, Int. J. Bifurc. Chaos.
[15] Gonzalo Alvarez,et al. Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations , 2006, nlin/0611017.
[16] S. M. Ulam,et al. On Combination of Stochastic and Deterministic Processes , 1947 .
[17] Di Xiao,et al. Cryptanalyzing a novel image cipher based on mixed transformed logistic maps , 2013, Multimedia Tools and Applications.
[18] Guanrong Chen,et al. Cryptanalysis of RCES/RSES Image Encryption Scheme , 2004, IACR Cryptol. ePrint Arch..
[19] Xingyuan Wang,et al. Image encryption using DNA complementary rule and chaotic maps , 2012, Appl. Soft Comput..
[20] L. Kocarev,et al. Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .
[21] Donald E. Knuth,et al. Deciphering a linear congruential encryption , 1985, IEEE Trans. Inf. Theory.
[22] Ranjan Bose,et al. Novel public key encryption technique based on multiple chaotic systems. , 2005, Physical review letters.
[23] I. Shatheesh Sam,et al. A novel image cipher based on mixed transformed logistic maps , 2010, Multimedia Tools and Applications.
[24] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[25] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[26] Robert M. May,et al. Simple mathematical models with very complicated dynamics , 1976, Nature.
[27] S. Li,et al. Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.
[28] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[29] Vijayan K. Asari,et al. No-Reference Video Quality Assessment Based on Artifact Measurement and Statistical Analysis , 2015, IEEE Transactions on Circuits and Systems for Video Technology.
[30] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[31] L. Kocarev,et al. Logistic map as a block encryption algorithm , 2001 .
[32] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[33] Kwok-Wo Wong,et al. Chosen plaintext attack on a cryptosystem with discretized skew tent map , 2006, IEEE Trans. Circuits Syst. II Express Briefs.
[34] Congxu Zhu,et al. A novel image encryption scheme based on improved hyperchaotic sequences , 2012 .
[35] Kwok-Tung Lo,et al. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2011, Signal Process..
[36] Yicong Zhou,et al. Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.