[1]
|
T. Kohda and A. Tsuneda., “Chaotic bit sequences for stream cipher cryptography and their correlation functions,” Proceedings of SPIE’s International Symposium on Information, Communications and Computer Technology, Applications and Systems, Vol. 2612, pp. 86-97, 1995.
|
[2]
|
M. Drutarovsk and P. Galajda, “Chaos based true random number generator embedded in a mixed-signal reconfigurable hardware,” Journal of Electrical Engineering, Vol. 57, pp. 218-225, April 2006.
|
[3]
|
J. C. Sprott, “Chaos and time-series analysis,” Oxford University Press, 2003.
|
[4]
|
N. Sajeeth, K. Philip, and J. Babu, “Chaos for stream cipher,” http://uk.arxiv:org/PScache/cs/pdf/0102012v1.pdf.
|
[5]
|
R. Matthews, “On the derivation of a chaotic encryption,” Vol. 8, pp. 29-49, January 1989.
|
[6]
|
N. Masuda and K. Aihara, “Cryptosystems with discretized chaotic maps,”. IEEE Transactions on Circuits and Systems, Vol. 49, pp. 28-40, January 1999.
|
[7]
|
S. Tao, W. Ruili, and Y. Yixun, “The theoretical design for a class of new chaotic feedback stream ciphers,” Acta Eletronica Sinica, Vol. 27, pp. 47-50, July 1999.
|
[8]
|
W. Lindsay and C. M Chie, “A survey of digital phase locked loops,” IEEE Proceedings, Vol. 69, pp. 410-431, April 1981.
|
[9]
|
G. Hsieh and C. Hung, “Phase locked loops–A survey,” IEEE Transactions on Industrial Electronics, Vol. 43, pp. 609-615, December 1996.
|
[10]
|
Q. Nasir, “Chaotic behavior of first order zero crossing digital phase locked loop,” 2004 IEEE Asia-Pacific Conference on Circuits and Systems, pp. 977-980, 2004.
|
[11]
|
AIS 31, “Functionality classes and evaluation methodology for true (physical) random number generators ver 3.1,” Bundesmat fur Sicherheir in der Information technik (BSI), Bon, Germany, September 2001.
|
[12]
|
M. E. Yalcin, J. K. Suykens, and J. Vandewalle, “True random bit generation from a double scroll attractor,” IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, Vol. 51, pp. 1395-1404, July 2004.
|
[13]
|
Texas Instrument, TMS320C6416 DSP Starter Kit (DSK), http://focus.ti.com/docs/prod/folders/print/tms320c6416.html.
|
[14]
|
H. C. Osborne, “Stability analysis of an nth power digital phase-locked loop–Part I: First-order DPLL,” IEEE Trans-actions on Communications, Vol. 28, No. 8, pp. 1343-1354, 1980.
|
[15]
|
D. Croker and J. Schiller, “Randomness recommendations for security,” Request for Comments 1750, 1994. http://www.ietf.org/rfc/rfc1750.txt.
|
[16]
|
M. Bucci, L. Germani, R. Luzzi, A. Trifiletti, and M. aranouovo, “A high-speed oscillator-based truly random number source for cryptographic applications on a smart card IC,” IEEE Transactions on Computers, Vol. 52, pp. 403-409, April 2003.
|
[17]
|
M. D. Restituto and A. R. V’azques, “Chaos-based random number generators–Part II: Practical realization,” IEEE Proceedings, Vol. 90, pp. 747-767, May 2002.
|
[18]
|
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, “Handbook of applied cryptography,” CRC Press, 1997. http://www.cacr.math.uwaterloo.ca/hac/.
|
[19]
|
J. Von Neumann, “Various techniques used in connection with random digits,” Applied Math Series, Notes by G. E. Forsythe, in National Bureau of Standards, Vol. 12, pp. 36-38, 1951.
|
[20]
|
Standards, Information Technology Security Evaluation Criteria (ITSEC), Provisional Harmonized Criteria, Version 1.2, 1991.
|
[21]
|
CEM-99/045, Common Methodology for Information Technology Security Evaluation (CEM) version 1.0,. 1999.
|