Baptista M S. Cryptography with chaos[J].Physics Letters A.1998, 240(1/2):50-54[2]Wong W K, Lee L P, and Wong K W. A modified chaoticcryptographic method[J].Comp Phys Comm.2001, 138(3):234-236[3]Palacios A and Juarez H. Cryptography with cycling chaos[J].Physics Letters A.2002, 303(5/6):345-351[4]Wong K W. A fast chaotic cryptographic scheme withdynamic look up table[J].Physics Letters A.2002, 298(4):238-242[5]Wong K W, Ho S W, and Yung C K. A chaotic cryptographyscheme for generating short ciphertext[J].Physics Letters A.2003, 310(1):67-73[6]Wong K W. A combined chaotic cryptographic and hashingscheme[J].Physics Letters A.2003, 307(5/6):292-298[7]Li S J, Mou X Q, Ji Z, and Zhang J, et al.. Performanceanalysis of Jakimoski-Kocarev attack on a class of chaoticcryptosystems[J].Physics Letters A.2003, 307(1):22-28[8]Li S J, Chen G R, Wong K W, and Mou X Q, et al.. Baptista-type chaotic cryptosystems: Problems and countermeasures[J].Physics Letters A.2004, 332, (5/6):368-375[9]Wong K W, Man K P, and Li S J, et al.. A more securechaotic cryptographic scheme based on dynamic look-uptable[J].Circuits, Systems Signal Processing.2005, 24(5):571-584[10]Wei J, Liao X F, and Wong K W, et al.. Analysis andimprovement for the performance of Baptistas cryptographicscheme[J].Physics Letters A.2006, 354(1-2):101-109[11]Jokimoski G and Kocarev L. Analysis of some recentlyproposed chaos-based encryption algorithm[J].Physics LettersA.2001, 291(6):381-384[12]aacute;lvarez G, Montoya F, Romera M, and Pastor G.Cryptanalysis of dynamic look-up table based chaoticcryptosystems[J].Physics Letters A.2004, 326(3/4):211-218[13]Chen Y and Liao X F. Cryptanalysis on a modifiedBaptista-type cryptosystem with chaotic masking algorithm[J].Physics Letters A.2005, 342(5/6):389-396[14]Shanon C E. Communication theory of secrecy systems. BellSys Tech J, 1949, 28(4): 656-715.[15]李红达, 冯登国. 基于复合离散混沌动力系统的序列密码算法. 软件学报, 2003, 14(5): 991-998.Li H D and Feng D G. Stream cipher algorithms based oncomposite nonliner discrete chaotic dynamical systems.Journal of Software, 2003, 14(5): 991-998.[16]胡汉平, 刘双红, 王祖喜等. 一种混沌密钥流产生方法. 计算机学报, 2004, 27(3): 408-412.Hu H P, Liu S H, and Wang Z X, et al.. A Method forgenerating chaotic key stream. Chinese Journal ofComputer, 2004, 27(3): 408-412.[17]IEEE Computer Society. IEEE standard for binaryfloating-point arithmetic, ANSI/IEEE Std 754-1985 (August1985).
|