|
Bibliography [1] Data Encryption Standard, FIPS PUB 46, National Bureau of Standard. Washington D. C., pp. 59-74, 1977. [2] W. Diffie and M. E. Hellman. New direction in cryptography. IEEE Trans. on inform. Theory, IT-22, pp. 644-654, 1976. [3] R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems . Commun. ACM, 21, No.2, pp.120-126, 1978. [4] Brauce Schneier. Applied Cryptography:Protocols,Algorithms, and Source Code in C. John Wiley & Sons, Inc., seconded edition, 1996. [5] Toshiki Habutsu, Yoshifumi Nishio, Iwao Sasase, and Shinsaku Mori. A secret key cryptosystem by iteration a chaotic map . Advances in Cryptology: Eurocrypt'91, pp. 127-140, 1991. [6] S. C. Phatak and S. Suresh Rao. Logistic map: A possible random-number generator. Phys. Rev. E, 51, No.4, pp. 3670-3678, 1995. [7] M. Andrecut. Logistic map as a random number generator. Int. J. of Morden Phys. B, 12, No.9, pp. 921-930, 1998. [8] L.M. Pecora and T.L. Carroll. Synchronization in chaotic systems. Phys. Rev. Lett., 64, No.8, pp. 821-824, 1990. [9] Y.-Y. Chen. Masking messages in chaos. Europhysics Letters, 34, No.4, pp. 245-250, 1996. [10] Rong He and P.G.Vaidya. Implementation of chaotic cryptography with chaotic synchronization. Phys. Rev. E, 57, No.2, pp. 1532-1535, 1998. [11] F. James. A review of pseudorandom number generators. Computer Phys. Commun., 60, pp. 329-344, 1990. [12] D.E. Knuth. Deciphering a linear congruential encryption. IEEE Trans. on inform. Theory, IT-31, No.1, pp. 49-52, 1985. [13] John Boyar Plumstead. Inferring sequences produced by pseudo-random number generators. PhD thesis, University of California, Berkeley, 1983. [14] Security Requirements for Cryptographic Modules, FIPS PUB 140-1, Federal Information Processing Standards Publication. 1994. [15] Edward N. Lorenz. Deterministic nonperiodic ow. J. Atoms. Sci., 20, No.2, pp. 130-141, 1963. [16] Barry Saltzman. Finite amplitude free convection as an initial value problem. J. Atoms. Sci., 19, No.4, pp. 329-341, 1962. [17] Gabriel Perez and Hilda A. Cerdeira. Extracting messages masked by chaos. Phys. Rev. Lett., 74, No.11, pp. 1970-1973, 1995. [18] Chiang Kao and J.Y.Wong. Technical note:Several extensively tested random number generators. Computers Ops Res., 21, No.9, pp. 1035- 1039, 1994. [19] L.Boney, A.H.Tewk, and K.N.Hamdy. Digital watermarks for audio signals. IEEE Proceedings of Multimedia, pp. 473-480, 1996. [20] D.E. Knuth. The Art of Computer Programming:volume 2, Seminumberical Algorithms. Addison-Wesley, third edition, 1997. [21] E. Ott. Chaos in Dynamical Systems. Cambridge Univ. Press, 1993. [22] Colin Sparrow. Lorenz Equations:Bifurcations, Chaos, and Strange Attractors. Springer-Verlag, 1982. [23] Steven H. Strogatz. Nonlinear Dynamics and Chaos:with Applications to Physics, Biology, Chemistry, and Engineering. Addison-Wesley, 1994. [24] Hugh L. Montgomery, Ivan Niven, and Herbert S. Zuckerman. An Introduction to The Theory of Numbers. John Wiley & Sons, Inc., fifth edition, 1991. [25] R.A. Rueppel. Analysis and Design of Stream Ciphers. Springer-Verlag Berlin, Heidelberg, 1986.
|