Computer Science ›› 2017, Vol. 44 ›› Issue (7): 107-110.doi: 10.11896/j.issn.1002-137X.2017.07.020
Previous Articles Next Articles
CAO Xiao-mei, CHEN Hai-shan and WANG Shao-hui
[1] MASUDA N,AIHARA K.Cryptosystems with discretized chaotic maps[J].IEEE Transactions on Circuits and Systems I:Fundamental Theory and Applications,2002,49(1):28-40. [2] SUN F,Lü Z,LIU S.A new cryptosystem based on spatialchaotic system[J].Optics Communications,2010,283(10):2066-2073. [3] KANSO A.Self-shrinking chaotic stream ciphers[J].Communi-cations in Nonlinear Science and Numerical Simulation,2011,6(2):822-836. [4] ZHENG X,YU J,SHUAI Y.A novel authentication schemebased on chaos[C]∥2013 8th International Conference on Computer Science & Education.2013:879-882. [5] XIAO D,LIAO X,DENG S.A novel key agreement protocolbased on chaotic maps[J].Information Sciences,2007,177(4):1136-1142. [6] USAMA M,KHAN M K,ALGHATHBAR K,et al.Chaos-based secure satellite imagery cryptosystem[J].Computers & Mathematics with Applications,2010,60(2):326-337. [7] LEUNG H Y,CHENG L M,CHENG L L.Robust watermar-king schemes using selective curvelet coefficients based on a hvsmodel[J].International Journal of Wavelets,Multiresolution and Information Processing,2010,8(6):941-959. [8] XIAO D,LIAO X,WANG Y.Parallel keyed hash function construction based on chaotic neural network[J].Neurocomputing,2009,2(10):2288-2296. [9] GUO X,ZHANG J.Secure group key agreement protocol based on chaotic Hash[J].Information Sciences,2010,180(20):4069-4074. [10] ZHAO G,FANG J Q.Modern information safety and advances in application research of chaos-based security communication[J].Progress in Physics,2003,23(2):212-255.(in Chinese) 赵耿,方锦清.现代信息安全与混沌保密通信应用研究的进展[J].物理学进展,2003,23(2):212-255. [11] JAKIMOSKI G,KOCAREV L.Chaos and cryptography:block encryption ciphers based on chaotic maps[J].IEEE Transactions on Circuits and Systems I:Fundamental Theory and Applications,2001,48(2):163-169. [12] WEBSTER A F,TAVARES S E.On the design of S-boxes[M]∥Advances in Cryptology—CRYPTO’85 Proceedings.Springer Berlin Heidelberg,1985:523-534. [13] YI X,CHENG S X,YOU X H,et al.A method for obtaining cryptographically strong 8×8 S-boxes[C]∥Global Telecommunications Conference,1997(GLOBECOM’97).IEEE,1997:689-693. [14] TANG G,LIAO X,CHEN Y.A novel method for designing S-boxes based on chaotic maps[J].Chaos,Solitons & Fractals,2005,23(2):413-419. [15] KOHDA T,TSUNEDA A.Statistics of chaotic binary sequences[J].IEEE Transactions on Information Theory,1997,43(1):104-112. [16] CHEN G.A novel heuristic method for obtaining S-boxes[J].Chaos,Solitons & Fractals,2008,36(4):1028-1036. [17] HUSSAIN I,SHAH T,GONDAL M A,et al.A novel method for designing nonlinear component for block cipher based on TD-ERCS chaotic sequence[J].Nonlinear Dynamics,2013,73(1/2):633-637. [18] KHAN M,SHAH T,MAHMOOD H,et al.A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems[J].Nonlinear Dynamics,2012,70(3):2303-2311. [19] HUSSAIN I,SHAH T,MAHMOOD H,et al.A projectivegeneral linear group based algorithm for the construction of sub-stitution box for block ciphers[J].Neural Computing and App-lications,2013,22(6):1085-1093. [20] ZKAYNAK F,YAVUZ S.Designing chaotic S-boxes based on time-delay chaotic system[J].Nonlinear Dynamics,2013,74(3):551-557. [21] GUESMI R,AMINE BEN FARAH M,K ACHOURI A,et al.Chaos-based designing of a highly nonlinear S-box using Boolean functions[C]∥2015 12th International Multi-Conference on Systems,Signals & Devices (SSD).IEEE,2015:1-5. [22] TIAN Y,LU Z.S-box:LL Cascade Chaotic Map and Line Map[M]∥Image and Graphics.Springer International Publishing,2015:297-309. [23] FENG Y,LI L,HUANG F.A symmetric image encryption approach based on line maps[C]∥1st International Symposium on Systems and Control in Aerospace and Astronautics,2006(ISSCAA 2006).IEEE,2006:1362-1367. [24] QIN J,WANG P.A method to construct Dynamic S-Box based on Chaotic Map[J].Computer Science,2007,34(5):89-91.(in Chinese) 邱劲,王平.基于混沌映射的动态 S 盒构造方法[J].计算机科学,2007,34(5):89-91. [25] HASSANI M.Derangements and applications[J].Journal of Integer Sequences,2003,6(2):1-8. [26] LIU Y,TIAN S.Design and statistical analysis of a new chaos block cipher for WSN[C]∥2010 IEEE International Conference on Information Theory and Information Security.2010:327-330. [27] BENJEDDOU A,TAHA A,FOURNIER-PRUNARET D,et al.A new cryptographic hash function based on chaotic S-Box[C]∥CSNDSP.Austria,2008:23-25. [28] BLANCHARD P,DEVANEY R L,HALL G R.DifferentialEquations[M].London:Thompson,2006:96-111. |
No related articles found! |
|