[1]
|
F. Dachselt and W. Schwarz, “Chaos and Cryptography,” IEEE Transactions on Circuits and Systems I, Vol. 48, No. 6, 2001, pp. 1498-1509.
doi:10.1109/TCSI.2001.972857
|
[2]
|
T. Yang, “A Survey of Chaotic Secure Communication Systems,” International Journal of Computational Cognition, Vol. 2, No. 2, 2004, pp. 3473-3749.
|
[3]
|
G. Alvarez, F. Montoya, M. Romera and G. Pastor, 1999, “Chaotic Cryptosystems”, In: L. D. Sanson, Ed., ProCeedings of IEEE the 33rd 1999 Annual International Carnahan Conference on Security Technology, Madrid, 5-7 October 1999, pp. 332-338.
|
[4]
|
G. Alvarez and S. Li, “Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems,” International Journal of Bifurcation and Chaos, Vol. 16, No. 8, 2006, pp. 2129-2151.
doi:10.1142/S0218127406015970
|
[5]
|
S. N?mm and C. H. Moog, “Identifiability of Discrete-Time Nonlinear Systems,” Proceedings of the 6th IFAC Symposium on Nonlinear Control Systems, Stuttgart, Vol. 1, No. 3, 2004, pp. 477-489.
|
[6]
|
F. Anstett, G. Millerioux and G. Bloch, “Chaotic Cryp- tosystems: Cryptanalysis and Identifiability”, IEEE Tran- sactions on Circuits and Systems, Vol. 53, No. 12, 2008, pp. 2673-2680.
|
[7]
|
E. Solak, “On the Security of a Class of Discrete-Time Chaotic Cryptosys?tems,” Physics Letters A, Vol. 320, No. 5-6, 2004, pp. 389-395.
doi:10.1016/j.physleta.2003.11.008
|
[8]
|
N. Masuda and K. Aihara, “Cryptosystems with Discretized Chaotic Maps,” IEEE Transactions on Circuits and Systems I, Vol. 53, No. 6, 2002, pp. 1341-1352.
|
[9]
|
F. Huang and Z. H. Guan, “Cryptosystem Using Chaotic Keys,” Chaos, Solitons and Fractals, Vol. 23, No. 3, 2005, pp. 851-855.doi:10.1016/j.chaos.2004.05.026
|