Methods of attacking chaotic encryption and countermeasures
暂无分享,去创建一个
[1] Jaroslav Stark,et al. EXTRACTING SLOWLY VARYING SIGNALS FROM A CHAOTIC BACKGROUND , 1992 .
[2] Ta-lun Yang,et al. Breaking chaotic switching using generalized synchronization: examples , 1998 .
[3] Parlitz,et al. General approach for chaotic synchronization with applications to communication. , 1995, Physical Review Letters.
[4] Leon O. Chua,et al. Performance of Yamakawa's chaotic chips and Chua's circuits for secure communications , 1994, Proceedings of IEEE International Symposium on Circuits and Systems - ISCAS '94.
[5] Kevin M. Short,et al. Steps Toward Unmasking Secure Communications , 1994 .
[6] T. Endo,et al. Experiments of Secure Communications Via Chaotic Synchronization of Phase-Locked Loops , 1995 .
[7] D. R. Frey,et al. Chaotic digital encoding: an approach to secure communication , 1993 .
[8] Ljupco Kocarev,et al. General approach for chaotic synchronization with applications to communication. , 1995, Physical review letters.
[9] Mohamed I. Sobhy,et al. Chaotic algorithms for data encryption , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[10] Louis M. Pecora. Overview of chaos and communications research , 1993, Optics & Photonics.