Designing Network Encryption Machine Based on Henon Chaotic Key Algorithm
暂无分享,去创建一个
Bingbing Song | Qi Zhang | Qun Ding | Chunlei Fan | Hao-ran Sun | Q. Ding | C. Fan | Qi Zhang | Hao-ran Sun | Bingbing Song
[1] Zhou Li. Security Property of Chaotic Encryption Systems , 2001 .
[2] Zhou Zheng-ou. A Hardware-Realized Method of Chaotic Encryption , 2006 .
[3] Wang Yi-ming. Study on the Performances of Logistic Digital Chaotic Sequences , 2006 .
[4] Adrian Skrobek. Cryptanalysis of chaotic stream cipher , 2007 .
[5] Yuh-Min Tseng,et al. A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants , 2012, Comput. Networks.
[6] Qun,et al. Generation and Realization of Digital Chaotic Key Sequence Based on Double K-L Transform , 2013 .
[7] Yuh-Min Tseng,et al. Publicly verifiable multi-secret sharing scheme from bilinear pairings , 2013, IET Inf. Secur..
[8] Q. Ding,et al. Research on the quantifications of chaotic random number generators , 2013 .
[9] Xiaomin Wang,et al. Secure chaotic system with application to chaotic ciphers , 2013, Inf. Sci..
[10] Amir Akhavan,et al. Pseudo random number generator based on quantum chaotic map , 2014, Commun. Nonlinear Sci. Numer. Simul..
[11] Yuh-Min Tseng,et al. Efficient searchable ID-based encryption with a designated server , 2014, Ann. des Télécommunications.