[1]L.O. Chua, T. Lin, Chaos in digital filters, IEEE Trans. on CAS., 1988, CAS-35(6), 648-658.
|
[2]T. Lin, L. O. Chua, On chaos of digital filters in the real world, IEEE Trans. on CAS., 1991,CAS-38(10), 557-558.
|
[3]D.R. Frey, Chaotic digital coding: an approach to secure communication, IEEE Trans. on CAS.Ⅱ, 1993, CAS-Ⅱ-41(10), 660-666.
|
[4]T. Aislam, J. A. Edwards, Secure communications using chaotic digital encoding, Electron. Lett.,1996, 32(3), 190-191.
|
[5]M.J. Werter, An improved chaotic digital encoder, IEEE Trans. on CAS. Ⅱ, 1998, CAS-Ⅱ-45(2),227-229.
|
[6]W.G. Chambers, Comments on Chaotic digital encoding: an approach to secure communication,IEEE Trans. on CAS Ⅱ, 1999, CAS-Ⅱ-46(11), 1445-1447.
|
[7]M. Gotz, K. Kelber, W. Schwarz, Discrete-time chaotic encryption systems-Part Ⅰ: Statistical design approach, IEEE Trans. on CAS. I, 1997, CAS-I-44(10), 963-970.
|
[8]Li-Hui Zhou, Zheng-Jin Feng, A new idea of using one-dimensional PWL map in digital secure communications-Dual-resolution approach, IEEE Trans. on CAS. Ⅱ, 2000, CAS-Ⅱ-47(10), 1107-1111.
|
[9]B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York:Wiley, 1996, 162-163.
|
[10]A. Baranousky, D. Daems, Design of one-dimensional chaotic maps with prescribed statistical properties, Int’l J. of Bifur. Chaos., 1995, 5(6), 1585-1598.
|
[11]周红,凌燮亭,有限精度混沌系统的m序列扰动实现,电子学报,1997,25(7),95-97.
|