共 12 条
- [1] [Anonymous], 1991, ACM computing surveys (CSUR), DOI DOI 10.1145/116825.116852]5
- [2] Chaos and cryptography [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2001, 48 (12) : 1498 - 1509
- [3] Symmetric ciphers based on two-dimensional chaotic maps [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06): : 1259 - 1284
- [4] Secure hash function based on neural network [J]. NEUROCOMPUTING, 2006, 69 (16-18) : 2346 - 2350
- [5] Schneier B., 1996, Applied Cryptography: Protocols, Algorithms, and Source Code in C
- [6] Stinson D. R., 2018, Cryptography Theory and Practice
- [8] A combined chaotic cryptographic and hashing scheme [J]. PHYSICS LETTERS A, 2003, 307 (5-6) : 292 - 298