[1]
|
M. Santha and U. V. Vazirani, “Generating Quasi-Random Sequences from Slightly Random Sources,” Journal of Computer and System Sciences, Vol. 33, No. 1, 1986, pp. 75-87. http://dx.doi.org/10.1016/0022-0000(86)90044-9
|
[2]
|
G. B. Agnew, “Random Source for Cryptographic Systems,” Advanced in Cryptology—EUROCRYPT’87 Proceedings, SpringerVerlag, Berlin, 1988, pp. 77-81.
|
[3]
|
M. Schooniger and A. von Haeseler, “Simulating Efficiently the Evolution of DNA Sequences,” Bioinformatics, Vol. 11, No. 1, 1995, pp. 111-115. http://dx.doi.org/10.1093/bioinformatics/11.1.111
|
[4]
|
A. Gehani, T. LaBean and J. Reif, “DNA-Based Cryptography,” DIMACS Series in Discrete Mathematica and Theoretical Computer Science, Vol. 54, 2000, pp. 233-249. http://www.cs.duke.edu/~reif/paper/DNAcrypt/DNA5.DNAcrypt.pdf
|
[5]
|
eSTREAM Project, 2012. http://en.wikipedia.org/wiki/ESTREAM
|
[6]
|
H. J. Wu, “Stream Cipher HC-256,” ESTREAM, 2004. http://www.ecrypt.eu.org/stream/p3ciphers/hc/hc256_p3.pdf
|
[7]
|
F. Piva and G. Principato, “RANDNA: A Random DNA Sequence Generator,” Silico Biology, Vol. 6, 0024, 2006. http://www.bioinfo.de/isb/2006060024/
|
[8]
|
E. Lieberman-Aiden, et al., “Comprehensive Mapping of Long-Range Interactions Reveals Folding Principles of the Human Genome,” Science, Vol. 326, No. 5950, 2009, pp. 289-293. http://dx.doi.org/10.1126/science.1181369
|
[9]
|
A. Arneodo, C. Vaillant, B. Audit, F. Argoul. Y. d’Aubenton-Carafa and C. Thermes, “Multi-Scale Coding of Genomic Information: From DNA Sequence to Genome Structure and Function,” Physics Reports, Vol. 498, No. 2-3, 2011, pp. 45-188. http://dx.doi.org/10.1016/j.physrep.2010.10.001
|
[10]
|
S. Engela, A. Alemany, N. Forns, P. Maass and F. Ritort, “Folding and Unfolding of a Triple-Branch DNA Molecule with Four Conformational States,” Philosophical Magazine, Vol. 91, No. 13-15, 2011, pp. 2049-2065. http://dx.doi.org/10.1080/14786435.2011.557671
|
[11]
|
H. Y. Zhang and X. Y. Liu. “A CLIQUE Algorithm Using DNA Computing Techniques Based on Closed-Circle DNA Sequences,” Biosystems, Vol. 105, No. 1, 2011, pp. 73-82. http://dx.doi.org/10.1016/j.biosystems.2011.03.004
|
[12]
|
B. Banfai, H. Jia, J. Khatun, et al., “Long Noncoding RNAs Are Rarely Translated in Two Human Cell Lines,” Genome Research, Vol. 22, 2012, pp. 1646-1657. http://dx.doi.org/10.1101/gr.134767.111
|
[13]
|
M. B. Gerstein, A. Kundaje, M. Hariharan, et al., “Architecture of the Human Regulatory Network Derived from ENCODE Data,” Nature, Vol. 489, No. 7414, 2012, pp. 91-100. http://dx.doi.org/10.1038/nature11245
|
[14]
|
B. E. Bernstein, E. Birney, I. Dunham, et al., “An Integrated Encyclopedia of DNA,” Nature, Vol. 489, No. 7414, 2012, pp. 57-74. http://dx.doi.org/10.1038/nature11247
|
[15]
|
E. Pennisi, “Genomics. ENCODE Project Writes Eulogy for Junk DNA,” Science, Vol. 337, No. 6099, 2012, pp. 1159-1161. http://dx.doi.org/10.1126/science.337.6099.1159
|
[16]
|
W. F. Doolittle, “Is Junk DNA bunk? A Critique of ENCODE,” Proceedings of the National Academy of Sciences of the United States of America, Vol. 110, 2013, pp. 5294-5300.
|
[17]
|
J. M. Engreitz, A. Pandya-Jones, P. McDonel, et al., “Large Noncoding RNAs can Localize to Regulatory DNA Targets by Exploriting the 3D Architecture of the Genome,” Cold Spring Harbor Laboratory Press, Proceedings of The Biology of Genomes, 2013, p. 122.
|
[18]
|
J. S. Wang and M. Yan, “Numerical Methods in Bioinformatics,” Science Press, Beijing, 2013.
|
[19]
|
C. M. Gearheart, B. Arazi and E. C. Rouchka, “DNA-Based Random Number Generation in Security Circuitry,” Biosystems, Vol. 100, No. 3, 2010, pp. 208-214. http://dx.doi.org/10.1016/j.biosystems.2010.03.005
|
[20]
|
O. Okunoye Babatunde. “On Pseudorandom Number Generation from Programmable and Computable Biomolecules: Deoxyribonucleic (DNA) as a Novel Pseudorandom Number Generator,” World Applied Programming, Vol. 1, No. 3, 2011, pp. 215-227.
|
[21]
|
Y. P. Zhang, Y. Zhu, Z. Wang, R. O. Sinnott, “Index-Based Symmetric DNA Encryption Algorithm,” 4th International Congress on Image and Signal Processing (CSIP), Shanghai, 2011, pp. 2290-2294. http://dtl.unimelb.edu.au/researchfile287042.pdf
|
[22]
|
Y. P. Zhang and L. H. Bochen Fu (2012). “Research on DNA Cryptography,” In: J. Sen, Ed., Applied Cryptography and Network Security, InTech Press, Rijeka, Croatia, 2012, pp. 357-376 http://www.intechopen.com/books/applied-cryptography-and-network-security/research-on-dna-cryptography
|
[23]
|
G. C. Sirakoulis. “Hybrid DNA Cellular Automata for Pseudorandom Number Generation,” 2012 International Conference on High Performance Computing and Simulation (HPCS), Madrid, 2-6 July 2012, pp. 238-244
|
[24]
|
N. A. Tchurikov, O. V. Kretova, D. M. Fedoseeva, et al., “DNA Double-Strand Breaks Coupled with PARP1 and HNRNPA2B1 Binding Sites Flank Coordinately Expressed Domains in Human Chromosomes,” PLoS Genetics, Vol. 9, No. 4, 2013, Article ID: e1003429. http://dx.doi.org/10.1371/journal.pgen.1003429
|
[25]
|
J. Z. J. Zheng and C. H. Zheng, “A Framework to Express Variant and Invariant Functional Spaces for Binary Logic,” Frontiers of Electrical and Electronic Engineering in China, Vol. 5, No. 2, 2010, pp. 163-172. http://www.springerlink.com/content/91474403127n446u/
|
[26]
|
J. Zheng, C. Zheng and T. Kunii, “A Framework of Variant Logic Construction for Cellular Automata,” In: A. Salcido, Ed., Cellular Automata—Innovative Modelling for Science and Engineering, InTech Press, Rijeka, Croatia, 2011, pp. 325-352. http://www.intechopen.com/chapters/20706
|
[27]
|
Q. P. Li and J. Zheng, “2D Spatial Distributions for Measures of Random Sequences Using Conjugate Maps,” The Proceedings of the 11th Australian Information Warfare and Security Conference, Perth, 30 November-2 December 2010, pp. 1-9. http://ro.ecu.edu.au/isw/34
|
[28]
|
J. Zheng, C. Zheng and T, Kunii, “Interactive Maps on Variant Phase Spaces—From Measurements-Micro Ensembles to Ensemble Matrices on Statistical Mechanics of Particle Models,” In: A. Salcido, Ed., Emerging Application of Cellular Automata, InTech Press, Rijeka, Croatia, 2013, pp. 113-196. http://dx.doi.org/10.5772/51635
|
[29]
|
J. Zheng, “Novel Pseudo-Random Number Generation Using Variant Logic Framework,” 2nd International Cyber Resilience Conference, 2011, pp. 100-104. http://igneous.scis.ecu.edu.au/proceedings/2011/icr/zheng.pdf
|
[30]
|
W. Z. Yang and J. Zheng, “Pseudo-Random Number Generator Based on Variant Logic Model,” ChinaCom 2012 Conference Proceedings, 2012.
|
[31]
|
W. Z. Yang and J. Zheng, “Variant Pseudo-Random Number Generator,” Hakin9 Extra, Vol. 6, No. 13, 2012, pp. 28-31. http://hakin9.org/hakin9-extra-62012/
|
[32]
|
W. Q. Zhang and J. Zheng, “Randomness Measurement of Pseudorandom Sequence Using different Generation Mechanisms and DNA Sequence,” Journal of Chengdu University of Information Technology, Vol. 27, No. 6, 2012, pp. 548-555.
|
[33]
|
J. Zheng, W. Q. Zhang, J. Luo, W. Zhou and R. Shen, “Variant Map System to Simulate Complex Properties of DNA Interactions Using Binary Sequences,” Advances in Pure Mathematics, Special Issue: Number Theory and Cryptology, Vol. 3, No. 7A, 2013, pp. 5-24.
|