A Novel Chaotic Encryption Technique for Secure Communication
暂无分享,去创建一个
[1] Kevin M. Short,et al. Reconstructing the keystream from a chaotic encryption scheme , 2001 .
[2] Henk Nijmeijer,et al. An observer looks at synchronization , 1997 .
[3] Tao Yang,et al. Application of neural networks to unmasking chaotic secure communication , 1998 .
[4] Tao Yang,et al. A SURVEY OF CHAOTIC SECURE COMMUNICATION SYSTEMS , 2004 .
[5] Kia Fallahi,et al. An application of Chen system for secure chaotic communication based on extended Kalman filter and multi-shift cipher algorithm , 2008 .
[6] Kevin M. Short,et al. UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME , 1996 .
[7] Henk Nijmeijer,et al. Synchronization through Filtering , 2000, Int. J. Bifurc. Chaos.
[8] Wei Huang,et al. Unmasking Chaotic mask by a Wavelet Multiscale Decomposition Algorithm , 2001, Int. J. Bifurc. Chaos.
[9] Cuomo,et al. Circuit implementation of synchronized chaos with applications to communications. , 1993, Physical review letters.
[10] Leon O. Chua,et al. Cryptography based on chaotic systems , 1997 .
[11] Kevin M. Short,et al. Steps Toward Unmasking Secure Communications , 1994 .
[12] Pérez,et al. Extracting messages masked by chaos. , 1995, Physical review letters.
[13] Murat Akgül,et al. Observer Based Chaotic Message Transmission , 2003, Int. J. Bifurc. Chaos.
[14] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[15] Gonzalo Álvarez,et al. Breaking two secure communication systems based on chaotic masking , 2004, IEEE Transactions on Circuits and Systems II: Express Briefs.
[16] Achour Ouslimani,et al. Feasibility of Analog Realization of a Sliding-Mode Observer: Application to Data Transmission , 2008, IEEE Transactions on Circuits and Systems I: Regular Papers.