|
[1] M. Xiao, J. Cao, "Synchronization of a chaotic electronic circuit system with cubic term via adaptive feedback control," Communications in Nonlinear Science and Numerical Simulation, vol. 14, pp. 3379-3388, 2009. [2] T. Botmart, P. Niamsup, "Adaptive control and synchronization of the perturbed Chua’s system," Mathematics and Computers in Simulation, vol. 75, pp. 37-55, 2007. [3] C. H. Chen, L. J. Sheu, H. K. Chen, J. H. Chen, H. C. Wang, Y. C. Chao, Y. K. Lin, "A new hyper-chaotic system and its synchronization," Nonlinear Analysis: Real World Applications, vol. 10, pp. 2088-2096, 2009. [4] W. Li, X. Chen, "Projective synchronization of Chua’s chaotic system with dead-zone in the control input," Communications in Nonlinear Science and Numerical Simulation, vol. 14, pp. 3100-3107, 2009. [5] A. Rogers, J. Keating, R. Shorten, "A novel pattern classification scheme using the Baker’s map," Neurocomputing, vol. 55 , pp. 779-786, 2003. [6] S. Lian, J. Sun, Z. Wang, "Security analysis of a chaos-based image encryption algorithm," Physica A: Statistical Mechanics and its Applications, vol. 351, pp. 645-661, 2005. [7] H. Zhang, X. F. Wang, Z. H. Li, D. H .Liu, Y. C. Lin, "A new image encryption algorithm based on chaos system," International Conference on Robotics, Intelligent Systems and Signal Processing, vol. 2, pp. 778-782, 2003. [8] Z. H. Guan, F. Huang, W.Guan, "Chaos-based image encryption algorithm," Physics Letters A, vol. 346, pp. 153-157, 2005. [9] G. Peterson , "Arnold’s cat map," (http://online.redwoods.cc.ca.us/ins truct/darnold/laproj/Fall97/Gabe/catmap.pdf), 1997. [10] F. Han, X. Yu, S. Han, "Improved Baker map for image encryption," International Symposium on Systems and Control in Aerospace and Astronautics, pp. 1273-1276, 2006. [11] Y. Feng, L. Li, F. Huang, "A symmetric image encryption approach based on line maps," International Symposium on Systems and Control in Aerospace and Astronautics, pp. 1362-1367, 2006. [12] M. R. Zhang, G. C. Shao, K. C. Yi, "T-matrix and its applications in image processing," Electronics Letters, vol. 40, pp. 1583-1584, 2004. [13] J. F. Barrera, M. Tebaldi, R. Torroba, N. Bolognini, "Multiplexing encryption technique by combining random amplitude and phase masks," International Journal for Light and Electron Optics, vol. 120, pp.1-5, 2009. [14] W. A. Yang, D. M. Yuan, "A new method of key generation based on chaotic sequence," China Academic Journal Electronic Publishing House, Mathematics In Practice and Theory, vol. 36, pp. 160-164, 2006. [15] V. Patidar, N.K. Pareek, K.K. Sud, "A new substitution-diffusion based image cipher using chaotic standard and logistic maps," Communications in Nonlinear Science and Numerical Simulation, vol. 14, pp. 3056-3075, 2009. [16] X. Tong, M. Cui, "Image encryption with compound chaotic sequence cipher shifting dynamically," Image and Vision Computing, vol. 26, pp. 843-850, 2008. [17] N. K. Pareek, V. Patidar, K. K. Sud, "Image encryption using chaotic logistic map," Image and Vision Computing, vol. 24, pp. 926-934, 2006. [18] NIST FIPS PUB 46-3, "Data Encryption Standard (DES)," National Institute of Standards and Technology, U. S. Department of Commerce, 1999. [19] NIST FIPS PUB 197, "Announcing the Advanced Encryption Standard (AES),” National Institute of Standards and Technology, U. S. Department of Commerce, 2001. [20] S. Morioka, A. Satoh, "A 10-Gbps full-AES crypto design with a twisted BDD S-box architecture," Transactions on Very Large Scale Integration (VLSI) Systems, vol. 12, pp. 686-691, 2004. [21] Z. Liu, Y. Zeng, X. Zou, Y. Han, Y. Chen, "A high-security and low-power AES S-box full-custom design for wireless sensor network," Wireless Communications, Networking and Mobile Computing, pp. 2499-2502, 2007. [22] J. Qiu, X. Liao, P. Wang, "A method to construct dynamic S-box based on chaotic map," Eighth ACIS International Conference, vol. 3, pp. 522-525, 2007. [23] G. D. Natale, M. L. Flottes, B. Rouzeyre, "A novel parity bit scheme for Sbox in AES circuits," Design and Diagnostics of Electronic Circuits and Systems, pp. 1-5, 2007. [24] G. Chen, Y. Chen, X. Liao, "An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps," Chaos, Solitons and Fractals, vol. 31, pp. 571-579, 2007. [25] M. Asim, V. Jeoti, "On image encryption: comparison between AES and a novel chaotic encryption scheme," International Conference on Signal Processing, Communications and Networking, pp. 65-69, 2007. [26] M. Ashtiyani, P. M. Birgani, H. M. Hosseini, "Chaos-based medical image encryption using symmetric cryptography," Information and Communication Technologies: From Theory to Applications 3rd, pp. 1-5, 2008. [27] C. M. Ou, "Design of block ciphers by simple chaotic function," IEEE Computational intelligence magazine, vol. 3, pp. 54-59, 2008. [28] S. J. Finney, B. W. Williams, T. C. Green, "The RCD snubber revisited," Industry Applications Society Annual Meeting, vol. 2, pp. 1267-1273, 1993. [29] S. J. Finney, B. W. Williams, T. C. Green, "RCD snubber revisited," Transactions on Industry Applications, vol. 32, pp. 155-160, 1996. [30] C. D. Bridge, "Clamp voltage analysis for RCD forward converters," Applied Power Electronics Conference and Exposition, vol. 2, pp. 959-965, 2000. [31] Y. Gu, X. Gu, L. Hang, Y. Du, Z. Lu, Z. Qian, "RCD reset dual switch forward DC/DC converter," Power Electronics Specialists Conference, vol. 2, pp. 1465-1469, 2004. [32] J. A. Cobos, O. Garcia, J. Sebastian, J. Uceda, "RCD clamp PWM forward converter with self driven synchronous rectification," International Conference on Industrial Electronics, Control, and Instrumentation, vol. 2, pp. 1336-1341, 1993. [33] T. Matsumoto, L. O. Chua, M. Komuro, "The double scroll," IEEE Trans Circ System, vol. 32, pp. 798-818, 1985. [34] C. E. Shannon, "A mathematical theory of communication," Reprinted with cor- rections from The Bell System Technical Journal, vol. 27, pp. 379–423, 623–656, 1948. [35] A. G. Bluman, "Elementary statistics," McGraw-Hill, New York, 1998. [36] G. Chen, Y. B. Mao, C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons and Fractals, vol. 21, pp. 749-761, 2004. [37] H. S. Kwok, Wallace K. S. Tang, "A fast image encryption system based on chaotic maps with finite precision representation," Chaos Solitons and Fractals, vol. 32, pp. 1518-1529, 2007. [38] D. E. Goldberg, Genetic algorithms in search, optimization and machine learning, MA, Addison-Wesley, 1989. [39] A. Hren, J. Korelic, M. Milanovic, "RC-RCD clamp circuit for ringing losses reduction in a flyback converter," IEEE Transactions on Circuits and systems - II:Express briefs, vol. 53, pp. 369-373 2006.
|