Symmetric Key Encryption Based on Rotation-Translation Equation
暂无分享,去创建一个
[1] Lequan Min,et al. A 6 dimensional chaotic generalized synchronization system and design of pseudorandom number generator with application in text encryption , 2014 .
[2] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[3] Amartya Ghosh,et al. A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY , 2013 .
[4] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[5] P. Jarratt. Some fourth order multipoint iterative methods for solving equations , 1966 .
[6] Ioannis M. Kyprianidis,et al. Text Encry ption Scheme Realized with a Chaotic Pseudo - Random Bit Generator , 2013 .
[7] Majid Babaei,et al. A novel text and image encryption method based on chaos theory and DNA computing , 2012, Natural Computing.
[8] Krasimir Kordov,et al. Image Encryption Using Chebyshev Map and Rotation Equation , 2015, Entropy.
[9] Indrajit Banerjee,et al. Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map , 2019, J. Inf. Secur. Appl..
[10] S. Li,et al. Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.
[11] L. Cardoza-Avendaño,et al. A novel pseudorandom number generator based on pseudorandomly enhanced logistic map , 2016, Nonlinear Dynamics.
[12] J. Traub. Iterative Methods for the Solution of Equations , 1982 .
[13] Chun-Liang Lin,et al. Text encryption using ECG signals with chaotic Logistic map , 2010, 2010 5th IEEE Conference on Industrial Electronics and Applications.
[14] C. Sanchez-Avila,et al. The Rijndael block cipher (AES proposal) : a comparison with DES , 2001, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).
[15] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[16] Kui Wu,et al. DAFA - A Lightweight DES Augmented Finite Automaton Cryptosystem , 2012, SecureComm.
[17] Gulshan Singh,et al. On the Location of Zeros of Polynomials , 2011, Am. J. Comput. Math..
[18] M. A. Murillo-Escobar,et al. A novel symmetric text encryption algorithm based on logistic map , 2014 .
[19] Xing-Yuan Wang,et al. New chaotic encryption algorithm based on chaotic sequence and plain text , 2014, IET Inf. Secur..
[20] Vejdi I. Hasanov,et al. On some families of multi-point iterative methods for solving nonlinear equations , 2006, Numerical Algorithms.
[21] A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application , 2001 .
[22] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[23] Madhumita Panda,et al. Plain Text Encryption Using AES, DES and SALSA20 by Java Based Bouncy Castle API on Windows and Linux , 2015, 2015 Second International Conference on Advances in Computing and Communication Engineering.
[24] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[25] Zahraddeen Abubakar Pindar,et al. A Survey on the Cryptographic Encryption Algorithms , 2017 .
[26] Rajesh Bansode,et al. AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection , 2016 .
[27] Ioannis M. Kyprianidis,et al. Text encryption device based on a chaotic random bit generator , 2018, 2018 IEEE 9th Latin American Symposium on Circuits & Systems (LASCAS).
[28] Christos H. Skiadas,et al. Chaotic Modelling and Simulation: Analysis of Chaotic Models, Attractors and Forms , 2008 .
[29] Christos K. Volos,et al. Secure Text Encryption Based on Hardware Chaotic Noise Generator , 2014 .
[30] James Demmel,et al. IEEE Standard for Floating-Point Arithmetic , 2008 .
[31] Y. Hassoun,et al. Entropy model for symmetric key cryptography algorithms based on numerical methods , 2015, 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR).
[32] Leonhard Euler. Public-Key Cryptosystem , 2011, Encyclopedia of Cryptography and Security.
[33] Xuejia Lai,et al. A Proposal for a New Block Encryption Standard , 1991, EUROCRYPT.
[34] Akif Akgul,et al. Text encryption by using one-dimensional chaos generators and nonlinear equations , 2013, 2013 8th International Conference on Electrical and Electronics Engineering (ELECO).
[35] Jiasong Wu,et al. A Novel Chaos-Based Symmetric Image Encryption Using Bit-Pair Level Process , 2019, IEEE Access.