|
[1]N. W. Abderrahim, F. Z. Benmansour, O. Seddiki, “A Chaotic Stream Cipher Based on Symbolic Dynamic Description and Synchronization,” Science Business Media Dordrecht, April 2014. [2]G. Alvarez, S. Li, “Some Basic Cryptographic Requirements for Chaos-based Cryptosystems,” International Journal of Bifurcation and Chaos, 2006. [3]S. Anand and Gurumurthi V. Ramanan. “Periodicity, Complementarity and Complexity of 2-adic FCSR Combiner Generators,” ASIACCS ’06, March 21–24, Taipei, Taiwan, 2006. [4]François Arnault, Thierry P. Berger, and Marine Minier, “On the Security of FCSR-based Pseudorandom Generators,” ECRYPT Network of Excellence – SASC Workshop, 2007. [5]Alex Biryukov, “Resynchronization attack,” Encyclopedia of Cryptography and Security, pp. 1042–1043, 2011. [6]Chen, Li Zhang, Yifang Weng, “A Data Encryption Algorithm based on Dual Chaotic System,” International Conference on Computer Application and System Modeling, pp. 431–435, Dec. 2010. [7]E. Dawson, “Cryptanalysis of Summation Generator,” Advances in Cryptology-AUSCRYPT’92, Lecture Notes in Computer Science, Springer, Berlin, pp. 209–215, 1993. [8]Y. Feng J. Li and X. Yang, “Discrete Chaotic Based 3D Image Encryption Scheme,” Sympos on Photonics and Optoelectronics, pp. 1–4, Aug. 2009. [9]M. François, T. Grosgesa D, and Barchiesia R. Errac. “Pseudo-random Number generator Based on Mixing of Three Chaotic Maps,” Volume 19, Issue 4, pp. 887–895 April 2014. [10]J. Fridrich, “Symmetric Ciphers Based on Two-Dimensional Chaotic Maps,” Int. J. Bifurcat Chaos, volume 8, pp. 1259–1284, 1998. [11]Mark Goresky, Andrew Klapper, “Fibonacci and Galois Representations of Feedback with Carry Shift Registers,” Information Theory, IEEE Transactions, December 4, 2004. [12]HanPing Hu, LingFeng Liu, NaiDa Ding, “Pseudorandom Sequence Generator Based on the Chen Chaotic System,” Computer Physics Communications, Volume 184, Issue 3, pp. 765–768, March 2013. [13]Hu, H., Wu, X., Zhang, B, “Parameter Estimation Only from the Symbolic Sequences Generated by Chaos System,” Chaos Solitons, Fractals 22, pp 359–366, 2004. [14]Ali Kanso, Nejib Smaoui, “Logistic Chaotic Maps for Binary Numbers Generations,” Chaos Solitons & Fractals, Volume 40, pp. 2557–2568, June 2009. [15]Ali Kanso, “Self-shrinking chaotic stream ciphers,” Communications in Nonlinear Science and Numerical Simulation, Volume 16, Issue 2, pp. 822–836, February 2011. [16]Klapper A., Goresky M., “2-Adic shift registers In: Fast Software Encryption,” Cambridge SecurityWorkshop Lecture Notes in Computer Science, volume 809, pp. 174–178. Springer, New York, 1993. [17]C. S. Laih, L. Harn and C. C. Chang, “Contemporary Cryptography and Its Applications,” Flag Publishing Co., LTD, Taipei, Taiwan, R.O.C., 2004. [18]Lian, S., Sun, J., Wang, Z. “A Block Cipher Based on a Suitable Use of the Chaotic Standard Map,” Chaos Solitons and Fractals. Elsevier, Berlin, 2005. [19]Meng-Hui Lim, Bok-Min Goi, SangGon Lee, and HoonJae Lee, “Hierarchical Dawson’s Summation Generator,” International Conference on Convergence Information Technology, 2007 [20]E. N. Lorenz, “Deterministic Non-periodic Flow,” J. of Atmos. Sci., volume 20, pp. 130–141, 1963. [21]Yongyi Mao,Xiang Chen, “An Encryption Algorithm of Chaos Based on Sine Square Mapping,” Computational Intelligence and Design (ISCID), Fourth International Symposium, volume 1, pp. 131–134, 2011. [22]G. L. Mayhew, “A Low Cost, High Speed Encryption System and Method,” Proc. of the 1994 IEEE Sysmposium on Security and Privacy, May. 1994, pp. 147–154. [23]Hiroyuki Nagashima and Yoshikazu Baba, “Intoduction to Chaos, Physics and Mathematics of Chaotic Phenomena,” CRC Press, January, 1998. [24]L. M. Pecora and T.L. Carroll, “Synchronized Chaotic Signals and Systems,” Proceeding of IEEE ICASSP, pp. 137–140, 1992. [25]Pierre Collett, Jean-Pierre, Eckmann, “Iterated Maps on the Interval as Dynamical Systems,” Birkhauser, 1980. [26]Rivest, Ronald L. “Cryptology,” In J. Van Leeuwen. Handbook of Theoretical Computer Science, Volume 1, 1990. [27]A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray and S. Vo, “Special Publication 800-22 Revision 1: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications”, National Institute of Standards and Technology, Aug. 2008. [28]Wang, K., Pei, W., Hou, X., Shen, Y., He, Z, “Symbolic Dynamics Approach to Parameter Estimation Without Initial Value,” Physics Letters A, Volume 374, Issue 1, pp. 44–49, 2009. [29]K. W. Wong, “A Fast Chaotic Cryptographic Scheme With Dynamic Look-up Table,” Physics Letters A, Volume 298, Issue 4, pp. 238–242, 2002. [30]Yu Zheng, Xiaohu Tang, Dake He, and Lixing Xu, “Investigation on Pseudorandom Properties of FCSR Sequence,” International Conference of Communications, Circuits and Systems, China, 2005. [31]National Institute of Standards and Technology, “Security Requirements for Cryptographic Modules,” Federal Information Processing Standards Publication 140-1, Jan. 1994. [32]National Institute of Standard Technology, “Announcing the Advanced Encryption Standard (AES) ,” Federal Information Processing Standards Publication 197, Nov. 2001.
|