1. Fan W H, Tian X J, Chen J F, et al. Dynamics of erbium-doped fibre laser with optical delay feedback and chaotic synchronization. Chinese Physics, 2007, 16(10): 2908–2912
2. Zhou P. Chaos synchronization on parameters adaptive control for Chen chaotic system. The Journal of China Universities of Posts and Telecommunications, 2003, 10(3): 91–94
3. Zhang J S, Wang X M, Zhang W F. Chaotic keyed Hash function based on feedforward-feedback nonlinear digital filter. Physics Letters A, 2007, 362(5–6): 439–448
4. Chen S, Zhong X X. Chaotic block iterating method for pseudo-random sequence generator. The Journal of China Universities of Posts and Telecommunications, 2007, 14(1): 45–48
5. Li S J, Mou X Q, Cai Y L. Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography. Proceedings of 2nd International Conference on Cryptology, Dec 16–20, 2001, Berlin, Germany: Springer, 2001, 316–329
6. Li C Q, Li S J, Alvarez G, et al. Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Physics Letters A , 2007, 369: 23–30
7. Short K. Steps toward unmasking secure communications. International Journal of Bifurcation and Chaos, 1994, 4(4): 959–977
8. Short K. Unmasking a modulated chaotic communications scheme. International Journal of Bifurcation and Chaos, 1996, 6(2): 367–375
9. Pareek N, Patidar V, Sud K. Image encryption using chaotic logistic map. Image and Vision Computing, 2006, 24(9): 926–934
10. Zhang W, Peng J, Yang H Q, et al. A digital image encryption scheme based on the hybrid of cellular neural network and logistic map. Proceedings of 2nd International Symposium on Neural Networks: Advances in Neural Networks, May 30–Jun 1, 2005, Chongqing, China. Berlin, Germany: Springer, 2005, 860–867
11. Wang Y, Zheng D L, Ju L. Digital image encryption algorithm based on three-dimension Lorenz chaos system. Journal of University of Science and Technology Beijing, 2004, 26(6): 678–682 (in Chinese)
12. Chen G R, Mao Y B, Chui C K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals, 2004, 21(3): 749–761
13. Menezes A, Oorschot P, Vanstone S. Handbook of applied cryptography. New York, NY, USA: CRC Press, 1996: 169–203
14. Richter H. The generalized Henon maps: examples for higher- dimensional Chaos. International Journal of Bifurcation and Chaos, 2002, 12(6): 1371–1381
15. Henon M. A two dimensional mapping with a strange attractor. Communications in Mathematical Physics, 1976, 50(1): 69–77
16. Rueppel R. Linear complexity and random sequences. Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT’85), Apr 9–11, 1985, Linz, Austria. Berlin, Germany: Springer, 1986, 167–188 |