|
References [1] T. Addabbo, M. Alioto, A. Fort, A. Pasini, S. Rocchi, and V. Vignoli. A class of maximum-period nonlinear congruential generators derived from the Rnyi chaotic map. IEEE Transactions on Circuits and Systems - I, 54(4):816-828, April 2007.
[2] E. 'Alvarez, A. Fernandez, P. Garc, J. Jimenez, and A. Marcano. New approach to chaotic encryption. Phys. Lett. A, 263:373-375, 1999.
[3] G. 'Alvarez and S. Li. Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(8):2129-2151, August 2006.
[4] M.S. Baptista. Cryptography with chaos. Physics Letters A, 240(1-2):50-54, 1998.
[5] P. Bergamo, P. DArco, A. D. Santis, and L. Kocarev. Security of public-key cryptosystems based on chebyshev polynomials. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMSXI: REGULAR PAPERS, 52(7):1382-1393, JULY 2005.
[6] G. M. Berstein and M. A. Lieberman. Method and apparatus for generating secure random numbers using chaos. US Paten, page 5007087, 1991.
[7] R. Bose. Novel public key encryption technique based on multiple chaotic systems. PHYSICAL REVIEW LETTERS, 26:098702-1 098702-4, AUGUST 2005.
[8] J Cernak. Digital generators of chaos. Physics Letters A, 214(3-4):151-160, May 1996.
[9] W. Di_e and M. E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(2):644-654, Nov. 1976.
[10] D. R. Frey. Chaotic digital encoding: An approach to secure communication. IEEE Trans. Circuits Syst.-II, 40:660-666, 1993.
[11] J. Fridrich. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation and Chaos, 8:1259-1284, 1998.
[12] J.P. Goedgebuer, L Larger, and H Porte. Optical cryptosystem based on synchronization of hyperchaos generated by a delayed feedback tunable laser diode. Physical Review Letters, 80(10):2249-2252, May 1998.
[13] JA Gonzalez and R Pino. A random number generator based on unpredictable chaotic functions. Computer Physics Communications, 120(2-3):109-114, August 1999.
[14] D. Guo, L. M. Cheng, and L. L. Cheng. A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks. Appl. Intell., 10:71-84, 1999.
[15] T. Habutsu, Y. Nishio, I. Sasase, and S. Mori. A secret key cryptosystem by iterating a chaotic map. in Advances in Cryptology X EUROCRYPT91, Lecture Notes in Computer Science, 547:127-140, 1991.
[16] F. Huang and Z.-H. Guan. Cryptosystem using chaotic keys. Chaos Solit. Fract., 23:851-855, 2005.
[17] G. Jakimoski and L. Kocarev. Chaos and cryptography: Block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst.-I, 48:163-169, 2001.
[18] C. Juang, C.C. Huang, T.M. Hwang, J. Juang, and W.W. Lin. Optoelectronic delayed-feedback and chaos in quantum-well laser diodes. Optics Communications, 192(1-2):77-81, May 2001.
[19] L. Kocarev, G. Jakimoski, T. Stojanovski, and U. Parlitz. From chaotic maps to encryption schemes. in Proc. IEEE Int. Symp. Circuits and Systems(ISCAS98), 4:514-517, 1998.
[20] L. Kocarev and Z. Tasev. Public-key encryption based on chebyshev maps. In Proc IEEE Symp Circ Syst (ISCAS'03), volume 3, page 28V31, 2003.
[21] L. Kocareva, M. Sterjevb, A. Feketec, and G. Vattayd. Public-key encryption with chaos. CHAOS, 14(4):1078-1082, DECEMBER 2004.
[22] H. Lu, S.Wang, X. Li, G. Tang, J. Kuang, W. Ye, and G. Hu. A new spatiotemporally chaotic cryptosystem and its security and performance analyses. Chaos, 14:617-629, 2004.
[23] P. L'Ecuyer and R. Simard. Testu01:a c library for empirical testing of random number generators. ACM Transactions on Mathematical Software, 33(4):1-40, 2007.
[24] S.-C. Lee, P.-H.and Pei and Y.-Y. Chen. Generating chaotic stream ciphers using chaotic systems. Chinese J. Phys., 41:559-581, 2003.
[25] C.Y. Li, J.S. Chen, and T.Y. Chang. A chaos-based pseudo random number generator using timeing-based reseeding method. In IEEE International Symposium on Circuits and Systems, 2006. ISCAS 2006, Proceedings, pages 21-24, 2006.
[26] P Li, Z Li, WA Halang, and et al. A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map. Physics Letters A, 349(6):467-473, January 2006.
[27] S. Li, G. Chen, and X. Mou. On the dynamical degradation of digital piecewise linear chaotic maps. International Journal of Bifurcation and Chaos, 15(10):3119- 3151, October 2005.
[28] S. Li, K.-W. Chen, G.and Wong, X. Mou, and Y. Cai. Baptista-type chaotic cryptosystems: Problems and countermeasures. Phys. Lett. A, 332:368-375, 2004.
[29] S. Li, X. Mou, and Y. Cai. Pseudo-random bit generator based on couple chaotic systems and its application in stream-ciphers cryptography. In Progress in Cryptology - INDOCRYPT 2001, Lecture Notes in Computer Science vol. 2247, pages 316-329. Springer-Verlag, Dec. 2001.
[30] X. Li, S.and Mou and Y. Cai. Pseudo-random bit generator based on couple chaotic systems and its application in stream-ciphers cryptography. in Progress in Cryptology X INDOCRYPT 2001, Lecture Notes in Computer Science, 2247:316-329, 2001.
[31] N. Masuda and K. Aihara. Cryptosystems with discretized chaotic maps. IEEE Trans. Circuits Syst.-I, 49, 2002.
[32] R. Matthews. On the derivation of a “chaotic” encryption algorithm. Cryptologia, XIII(1):29-42, 1989.
[33] S. Papadimitriou, T. Bountis, S. Mavaroudi, and A. Bezerianos. A probabilistic symmetric encryption scheme for very fast secure communications based on chaotic systems of difference equations. Int. J. Bifurcation and Chaos, 11:3107-3115, 2001.
[34] M. Rabin. Digitalized signatures and public-key functions as intractable as factorization. MIT Laboratory for Computer Science, January 1979.
[35] R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
[36] F. Robert. Discrete Iterations: A Mectric Study, volume 6 of Spring Series in Computational Mathematics. Springer-Verlag, Berlin, 1986.
[37] C Robinson. Dynamical Systems: Stability, Symbolic Dynamics, and Chaos. CRC Press Inc., Florida, 2000.
[38] A. Rukhin, J. Soto, M. Nechvatal, J.and Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, and S. Vo. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, National Inst. of Standards and Technology, Gaithersburg, MD, August 2008.
[39] T Sang, RLWang, and YX Yan. Perturbance-based algorithm to expand cycle length of chaotic key stream. Electronics Letters, 34(9):873-874, April 1998.
[40] T Stojanovski and L Kocarev. Chaos-based random number generators - part i: Analysis. IEEE Transactions on Circuits and Systems I-Fundamental Theory and Applications, 48(3):281-288, March 2001.
[41] G. Tang, X. Liao, and Y. Chen. A novel method for designing s-boxes based on chaotic maps. Chaos Solit. Fract., 23:413-419, 2005.
[42] J. Uis, E. Ugalde, and G. Salazar. A cryptosystem based on cellular automata. Chaos, 8:819-822, 1998.
[43] K. Wang, W.-J. Pei, L.-H. Zou, and Z.-Y. He. Comment on novel public key encryption technique based on multiple chaotic systems. Phys. Rew. Lett, 95:816-818, 2005.
|