Computer Science ›› 2017, Vol. 44 ›› Issue (6): 133-138.doi: 10.11896/j.issn.1002-137X.2017.06.022
Previous Articles Next Articles
YAN Le-le and LI Hui
[1] XIAO H J,QIU S S,DENG C L.Image Encryption SchemeBased on AES and Chaotic Series Encryption[J].Computer Engineering,2007,3(23):154-155.(in Chinese) 肖慧娟,丘水生,邓成良.基于混沌映射和AES算法的图像加密方案[J].计算机工程,2007,3(23):154-155. [2] ZHU L B,DAI G Z,LIU H.An Optimized Data Stream Encryption and Decryption Implementation of AES Algorithm with Improved-ECB(IECB) Mode[J].Computer Engineering and Applications,2006,2(12):1-5.(in Chinese) 朱灵波,戴冠中,刘航.一种改进ECB模式的AES算法加解密优化方案[J].计算机工程与应用,2006,2(12):1-5. [3] CHEN H,CHEN Y.Research on AES Algorithm Based onChaos[J].Journal of Beijing Technology and Business University(Natural Science Edition),2009,7(5):57-60.(in Chinese) 陈红,陈谊.一种基于混沌的AES算法的研究[J].北京工商大学学报(自然科学版),2009,7(5):57-60. [4] ZHAO R,WANG Q S,WEN H P.Design of AES algorithmBased on Two Dimensional Logistic and Chebyshev Chaotic Map-ping[J].Microcomputer Information,2008,4(33):43-45.(in Chinese) 赵芮,王庆生,温会平.基于二维Logistic与Chebyshev映射AES混沌加密算法[J].微计算机信息,2008,4(33):43-45. [5] CHEN D,QING D,WANG D.AES Key Expansion Algorithm Based on 2D Logistic Mapping[C]∥Fifth International Workshop on Chaos-Fractals Theories and Applications.2012:207-211. [6] HRAOUI S,GMIRA F,JARAR A O,et al.Benchmarking AES and chaos based logistic map for image encryption[C]∥2013 ACS International Conference on Computer Systems and Applications (AICCSA).IEEE,2013:1-4. [7] CHALLITA N,BAKHACHE B.Enhancement of S-AES using chaos for the support of biomedical applications[C]∥International Conference on Advances in Biomedical Engineering.IEEE,2013:175-178. [8] PRADHAN C,BISOI A K.Chaotic Variations of AES Algorithm[J].International Journal of Chaos,Control,Modelling and Simulation,2013,2(2):19-25. [9] DAEMEN J, RIJMEN V.AES Proposal:The Rijndael Block Cipher (V2)[EB/OL].http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf, 1999. [10] ZHAO Y,LI X M.The Application of Compound Chaotic Encryption Algorithm in Power System Information Security[C]∥The 26th Academic Annual Meeting of Chinese Colleges major in Power System Automation and Chinese Institute Of Electrical Engineering Power System Specialized Committee.2010:193-193.(in Chinese) 赵云,李晓明.复合混沌加密算法在电力系统信息安全中的应用[C]∥中国高等学校电力系统及其自动化专业第二十六届学术年会暨中国电机工程学会电力系统专业委员会2010年年会.2010:193-193. [11] CAI J,CHEN X,XIANG X D.Substitution-Permutation Network Structured Image Encryption Algorithm Based on Chaotic Map[J].Computer Science,2014,1(9):158-164.(in Chinese) 蔡俊,陈昕,向旭东.一种基于混沌的代换-置换结构图像加密算法[J].计算机科学,2014,1(9):158-164. [12] AN Y M,HAO R F,ZHANG Z X,et al.The Generation and Analysis of Pseudo Chaotic Sequences Based on Tent Map[J].Journal of Taiyuan University of Technology,2008(S1) :71-74.(in Chinese) 闫永梅,郝润芳,张朝霞,等.基于Tent映射的伪混沌序列的产生和分析[J].太原理工大学学报,2008(S1):71-74. [13] JIA K J,LIANG J,DU T H,et al.Chaotic Encryption Algorithm Based on Logistic Map Applied in Remote Monitoring of Transportation[J].Control and Instruments in Chemical Industry,2012,9(12):96-100.(in Chinese) 贾科进,梁杰,杜太行,等.运输远程监控中基于Logistic映射的混沌加密算法[J].化工自动化及仪表,2012,9(12):96-100. [14] YU J F,YANG W G,LU W T,et al.Analysis of the Full Mapping Logistic Sequence’s Generation and Performance[J].Telecommunication Engineering, 2013(2):140-145.(in Chinese) 余金峰,杨文革,路伟涛,等.满映射Logistic数字混沌序列的产生及性能分析[J].电讯技术,2013(2):140-145. [15] STANDARDSTECHNOLOGY N I O.Annex C:Approved Random Number Generators for FIPS PUB 140-2,Security Requirements for Cryptographic Modules[J/OL].http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexc.pdf,2004. [16] ELBADAWY A M,MOKHTAR A,EL-MASRY W A,et al.A new chaos Advanced Encryption Standard (AES) algorithm for data security[C]∥2010 International Conference on Signals and Electronic Systems (ICSES).IEEE,2010:405-408. [17] MUHAYA F B,USAMA M,KHAN M K.Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption[C]∥International Conference on Emerging Intelligent Computing Technology and Applications.Springer-Verlag,2009:6-23. [18] YUAN K,HAN Z,LI Z.An Improved AES Algorithm Based on Chaos[C]∥International Conference on Multimedia Information Networking and Security.IEEE,2009:326-329. |
No related articles found! |
|