Computer Science ›› 2023, Vol. 50 ›› Issue (11): 333-339.doi: 10.11896/jsjkx.220900026
• Information Security • Previous Articles Next Articles
ZHAO Geng1,2, GAO Shirui1, MA Yingjie1, DONG Youheng2
CLC Number:
[1]LI L,ZHANG H G.Serpent—a candidate for Advanced Encryption Standard AES[J].Information Security and Communications Privacy,2000(1):68-72. [2]HE Y.Attack on reduced-round CRYPTION cipher[D].Jinan:Shandong University,2006. [3]KNUDSEN L.A Key-schedule Weakness in SAFER K-64[J].Lecture Notes in Computer Science,1995,963(1):274-286. [4]HU Y P,XIAO G Z,ZHANG Y Q.Modification of SAFER+[J].Journal of Xidian University,2000(6):730-735. [5]SU X D,CUI J S,ZHANG H G.One of the candidates of advanced encryption standard AES——Rijndael[J].Information Security and Communications,2000(1):62-67,78. [6]MASTUI M.New Block Encryption Algorithm MISTY[C]//FSE 97.Berlin:Springer Verlag,1997:54-68. [7]ZHU D,TONG X J,ZHANG M,et al.A New S-Box Generation Method and Advanced Design Based on Combined Chaotic System[J].Symmetry,2020,12(12):2087-2087. [8]NEUMANN J,BURKS A W.Theory of self-reproducing au-tomata[M].Urbana:University of Illinois Press,1966. [9]LANGTON C G.Self-reproduction in cellular automata[J].Physica D:Nonlinear Phenomena,1984,10(1/2):135-144. [10]JOSHI P,MUKHOPADHYAY D,ROYCHOWDHURY D.Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata[J].Cryptology and Information Security Series,2005,2005:396-396. [11]DONG Y H,ZHAO G,MA Y J.Two-dimensional pseudo-random coupled map lattices system based on partitioned elementary cellular automata and its dynamic properties[J].Journal on Communications,2022,43(1):71-82. [12]NASKAR P K,BHATTACHARYYA S,NANDY D,et al.Arobust image encryption scheme using chaotic tent map and cellular automata[J].Nonlinear Dynamics,2020,100(3):2877-2898. [13]刘桂芬,赵文强.加法噪声驱动的随机Lorenz系统吸引子及其上半连续性[J].重庆工商大学学报(自然科学版),2022,39(1):78-84. [14]CAO L C,LUO Y L,QIU S H,et al.A perturbation method to the tent map based on Lyapunov exponent and its application[J].Chinese Physics B,2015,24(10):82-89. [15]WOLFRAM S.Cellular automata as models of complexity[J].Nature,1984,311(5985):419-424. [16]LI W,PACKARD N.The structure of the elementary cellular automata rule space[J].Complex Systems,2000,4(3):281-297. [17]JAKIMOSKI G,KOCAREV L.Chaos and cryptography:block encryption ciphers based on chaotic maps[J].IEEE Transactions on Circuits and Systems I Regular Papers,2001,48(2):163-169. [18]HAN Y Y,HE Y R,LIU P H,et al.A Dynamic S-Box Construction and Application Scheme of ZUC Based on Chaotic System[J].Journal of Computer Research and Development,2020,57(10):2147-2157. [19]ZHAO G,ZHANG S M,MA Y J,et al.Design and analysis of dynamic S-box based on anti-degradation chaotic system[J].Journal of Computer Applications, 2022.42(10):3069-3073. [20]ÖZKAYNAK F.An Analysis and Generation Toolbox for Chaotic Substitution Boxes:A Case Study Based on Chaotic Labyrinth Rene Thomas System[J].Iranian Journal of Science and Technology,Transactions of Electrical Engineering,2020,44(1):89-98. [21]YAN W H,DING Q.A Novel S-Box Dynamic Design Based on Nonlinear-Transform of 1D Chaotic Maps[J].Electronics,2021,10(11):1313. [22]ADAMS C,TAVARES S.The structured design of crypto-graphically good s-boxes[J].Journal of Cryptology,1990,3(1):27-41. [23]BIHAM E,SHAMIR A.Differential Cryptanalysis of DES-like Cryptosystems[J].Journal of Cryptology,1991,4(1):63-72. [24]HALE J K,VERDYNLUNEL S M.Introduction to Functional Differential Equations[M].New York:Springer-Verlag,1993. [25]WEBSTER A F,TAVARES S E.On the Design of S-Boxes[J].Lecture Notes in Computer Science,1986,218(1):523-534. [26]SONY L Y,GONG X Q,HE X F,et al.Multi-stage malicious click detection on large scale Web advertising data[C]//Proceedings of Very Large Data Bases.New York:ACM,2013:67-72. [27]LIU Q,FANG J Q,ZHAO G,et al.Research on Chaotic Encryption System based on FPGA technology[J].Acta Physica Sinica,2012,61(13):78-83. |
[1] | ZHOU Xuequan, DU Nisuo, OUYANG Zhi. Chaos COOT Bird Algorithm Based on Cauchy Mutation and Differential Evolution [J]. Computer Science, 2023, 50(8): 209-220. |
[2] | SHI Ke-xiang, BAO Li-yong, DING Hong-wei, GUAN Zheng, ZHAO Lei. Chaos Artificial Bee Colony Algorithm Based on Homogenizing Optimization of Generated Time Series [J]. Computer Science, 2021, 48(7): 270-280. |
[3] | LIU Han-qing, KANG Xiao-dong, GAO Wan-chun, LI Bo, WANG Ya-ge, ZHANG Hua-li, BAI Fang. Research on Propagation of COVID-19 Based on Multiple Models [J]. Computer Science, 2021, 48(6A): 196-202. |
[4] | LU Yao, CHEN Kai-yan, WANG Yin-long and SHANG Qian-yi. L3 Cache Attack Against Last Round of Encryption AES Table Lookup Method [J]. Computer Science, 2020, 47(6A): 375-380. |
[5] | HAN Yu, ZHANG Wen-zheng, DONG Xin-feng. Design and Analysis of Trapdoor S-Box Based on Linear Partition [J]. Computer Science, 2020, 47(11A): 368-372. |
[6] | ZHANG He-jie,MA Wei-hua. Subway Passenger Flow Forecasting Model Based on Temporal and Spatial Characteristics [J]. Computer Science, 2019, 46(7): 292-299. |
[7] | LV Dong-mei, LI Guo-dong. Spatial Encryption Algorithm Based on Double Chaos and Color Image [J]. Computer Science, 2019, 46(11A): 450-454. |
[8] | HAN Xue-juan, LI Guo-dong, WANG Si-xiu. Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos [J]. Computer Science, 2019, 46(11A): 477-482. |
[9] | LIANG Yan-hui, LI Guo-dong, WANG Ai-yan. Frequency Domain Adaptive Image Encryption Algorithm Based on Fractional Order Chen Hyperchaos [J]. Computer Science, 2019, 46(11A): 488-492. |
[10] | LIANG Yan-hui, LI Guo-dong. Image Encryption Algorithm of Chaotic Cellular Automata Based on Fractional Hyperchaos [J]. Computer Science, 2019, 46(11A): 502-506. |
[11] | CHEN Gui-ping,WANG Zi-niu. Multiple Encrypted Storage Technology of User Information Based on Big Data Analysis [J]. Computer Science, 2018, 45(7): 150-153. |
[12] | ZHANG Yan. Research on Optimal Transportation Route Based on Chaos Optimization [J]. Computer Science, 2017, 44(Z6): 133-135. |
[13] | ZHANG Yue, SUN Hui-xiang, WEI Zheng-lei and HAN Bo. Chaotic Gray Wolf Optimization Algorithm with Adaptive Adjustment Strategy [J]. Computer Science, 2017, 44(Z11): 119-122. |
[14] | CAO Xiao-mei, CHEN Hai-shan and WANG Shao-hui. Method to Construct Secure S-boxes Based on Multimap [J]. Computer Science, 2017, 44(7): 107-110. |
[15] | WU Xiu-li and ZHOU Yong-quan. Improved Water Wave Optimization Algorithm Based on Chaos Optimization and Simplex Method [J]. Computer Science, 2017, 44(5): 218-225. |
|