共 28 条
- [1] Chain K., The Study and Security Analysis of HC Stream Cipher, Journal of Convergence Information Technology, 6, 6, pp. 439-454, (2011)
- [2] Lin W., Bai B., Tong S., Joint Demodulation and EMS Decoding Algorithm for Qary LDPC Codes, Journal of Convergence Information Technology, 6, 6, pp. 476-484, (2011)
- [3] Diffie W., Hellman M., New directions in cryptography, IEEE Trans. Information Theory, 22, 6, pp. 644-654, (1976)
- [4] Smid M.E., Branstad D.K., The data encryption standard: Past and future, Proceedings of the IEEE, 76, 5, (1988)
- [5] Hao B.L., Starting with parabolas: An introduction to chaotic dynamics, Scientific and Technological Education Publishing House, Shanghai, (1993)
- [6] Brown R., Chua L.O., Clarifying chaos: Examples and counterexamples, International Journal of Bifurcation and Chaos, 6, 2, pp. 219-249, (1996)
- [7] Lasota A., Mackey M.C., Chaos, Fractals and Noise: Stochastic Aspects of Dynamics, (1994)
- [8] Shannon C.E., Communication theory of secrecy systems, Bell System Technology Journal, 28, 4, pp. 656-715, (1949)
- [9] Chen G., Mao Y.B., Chui C.K., A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos, Solitons & Fractals, 21, 3, pp. 749-761, (2004)
- [10] Gao T.G., Chen Z.Q., Image encryption based on a new total shuffling algorithm, Chaos, Solitons & Fractals, 38, 1, pp. 213-220, (2008)