A Chaotic Key Expansion Algorithm Based on Genetic Algorithm
暂无分享,去创建一个
Qun Ding | Juan Wang | Bo-Wen Pan | Qian-Rui Wang | Q. Ding | Qianqian Wang | Juan Wang | Bowen Pan
[1] Xu Guobao. Logistic Mapping Digital-flow Chaos Strange Attractor and Its Parameter Analysis , 2002 .
[2] Chien-Ming Chen,et al. On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol , 2016, J. Netw. Intell..
[3] Priyanka Kaushal,et al. A Review on Information Security , 2018 .
[4] Neil Genzlinger. A. and Q , 2006 .
[5] Shaozhen Chen,et al. Cryptanalysis of full PRIDE block cipher , 2015, Science China Information Sciences.
[6] Takanori Isobe,et al. A Single-Key Attack on the Full GOST Block Cipher , 2011, Journal of Cryptology.
[7] Juan Wang,et al. Excellent Performances of The Third-level Disturbed Chaos in The Cryptography Algorithm and The Spread Spectrum Communication , 2016, J. Inf. Hiding Multim. Signal Process..
[8] Qun Ding,et al. ARM-embedded Implementation of H.264 Selective Encryption Based on Chaotic Stream Cipher , 2018, J. Netw. Intell..
[9] Raphael C.-W. Phan,et al. On the Existence of Related-Key Oracles in Cryptosystems Based on Block Ciphers , 2006, OTM Workshops.
[10] Xiqin Wang,et al. Weak key analysis for chaotic cipher based on randomness properties , 2012, Science China Information Sciences.
[11] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[12] Zhang Wei,et al. Novel Piecewise Logistic Chaotic Spread Spectrum Communication Algorithm , 2013 .
[13] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[14] Chien-Ming Chen,et al. On the Security of a Three-party Authenticated Key Agreement Protocol based on Chaotic Maps , 2017 .
[15] Lu Hai-dong. Genetic algorithm and its application , 2005 .