References
- A. Riaz and M. Ali, "Chaotic Communications, Their Applications and Advantages over Traditional Methods of Communication," IEEE Commun. Syst., Networks Digital Signal Process., July 2008, pp. 21-24.
- G. Millerioux, J.M. Amigo, and J. Daafouz, "A Connection between Chaotic and Conventional Cryptography," IEEE Trans. Circuits Syst., vol. 55, no. 6, July 2008, pp. 1695-1703. https://doi.org/10.1109/TCSI.2008.916555
- L. Kocarev, "Chaos Based Cryptography: A Brief Overview," IEEE Trans. Circuits Syst. Mag., vol. 1, no. 3, 2001, pp. 6-21. https://doi.org/10.1109/7384.963463
- G. Alvarez and S. Li, "Some Basic Cryptographic Requirements for Chaos Based Cryptosystems," Int. J. Bifurcation Chaos, vol. 16, no. 8, 2006, pp. 2129-2151. https://doi.org/10.1142/S0218127406015970
- T. Yang, C.W. Wu, and L.O. Chua, "Cryptography Based on Chaotic Systems," IEEE Trans. Circuits Syst., vol. 44, no. 5, Feb. 1997, pp. 469-472. https://doi.org/10.1109/81.572346
- G. Jakimoski and L. Kocarev, "Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps," IEEE Trans. Circuits Syst., vol. 48, no. 2, Feb. 2001, pp. 163-169. https://doi.org/10.1109/81.904880
- D. Socek et al., "Enhanced 1-D Chaotic Key Based Algorithm for Image Encryption," IEEE Security Privacy for Emerging Areas in Commun. Networks, 2005, pp. 406-407.
- T. Xiang et al., "A Novel Block Cryptosystem Based on Iterating a Chaotic Map," Phys. Lett. A, vol. 349, 2006, pp. 109-115. https://doi.org/10.1016/j.physleta.2005.02.083
- D. Yang et al., "A Novel Block Cryptosystem Based on Iterating Map with Output Feed-Back," Chaos, Solitons and Fractals, vol. 41, 2009, pp. 505-510. https://doi.org/10.1016/j.chaos.2008.02.017
- S. El Assad and C. Vladeanu, "Digital Chaotic Codec for DSCDMA Communication Systems," Lebanese Sci. J., vol. 7, no. 2, 2006, pp. 55-71.
- L. Kocarev et al., "Discrete Chaos I: Theory," IEEE Trans. Circuits Syst. Mag., vol. 53, no. 6, June 2006, pp.1300-1309. https://doi.org/10.1109/TCSI.2006.874181
- A. Awad et al., "Comparative Study of 1-D Chaotic Generators for Digital Data Encryption," IAENG Int. J. Comput. Sci., vol. 35, no. 4, 2008, pp. 483-488.
- D. Xiao, X. Liao, and P. Wei, "Analysis and Improvement of a Chaos-Based Image Encryption Algorithm," Chaos, Solitons & Fractals, vol. 40, no. 5, 2009, pp. 2191-2199. https://doi.org/10.1016/j.chaos.2007.10.009
- M. Ali B. Younes and A. Jantan, "An Image Encryption Approach Using a Combination of Permutation Techniques Followed by Encryption," IAENG Int. J. Comput. Sci. Network Security, vol. 8, no. 4, 2008, pp. 191-197.
- S.G. Lian, J. Sun, and Z. Wang, "A Block Cipher Based on a Suitable Use of Chaotic Standard Map," Chaos, Solitons and Fractals, vol. 26, no. 1, 2005, pp. 117-129. https://doi.org/10.1016/j.chaos.2004.11.096
- K.W. Wong, B.S.H. Kwok, and W.S. Law, "A Fast Image Encryption Scheme Based on Chaotic Standard Map," Phys. Lett. A, vol. 372, no. 15, 2008, pp. 2645-2652. https://doi.org/10.1016/j.physleta.2007.12.026
- Z. Shi and R. Lee, "Bit Permutation Instructions for Accelerating Software Cryptography," IEEE Application-Specific Syst. Architectures Processors, 2000, pp. 138-148.
- R.B. Lee, Z. Shi, and X. Yang, "Efficient Permutation Instructions for Fast Software Cryptography," IEEE Micro, vol. 21, no. 6, 2001, pp. 56-69. https://doi.org/10.1109/40.977759
- Y. Hilewitz, Z.J. Shi, and R.B. Lee, "Comparing Fast Implementations of Bit Permutation Instruction," IEEE Signals Syst., Comput., vol. 2, 2004, pp. 1856-1863.
- A. Awad, S.E. Assad, and D. Carragata, "A Robust Cryptosystem Based Chaos for Secure Data," IEEE Int. Symp. Image/Video Commun. over Fixed Mobile Networks, Bilbao, Spain 2008.
- S. Tao, W. Ruli, and Y. Yixun, "Perturbance Based Algorithm to Expand Cycle Length of Chaotic Key Stream," IEEE Electron. Lett., vol. 34, no. 9, 1998, pp. 873-874. https://doi.org/10.1049/el:19980680
- S. Li et al., "On the Security of a Chaotic Encryption Scheme: Problems with Computerized Chaos in Finite Computing Precision," Comput. Phys. Commun., vol. 153, no. 1, 2003 pp. 52-58. https://doi.org/10.1016/S0010-4655(02)00875-5
- A. Rukin et al., "A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications," NIST Special Publication, pp. 800-822 (with revisions dated May 15, 2001).
- M. Dworkin, "Recommendation for Block Cipher Modes of Operation. Methods and Techniques. Computers Security," Computer Security Division, Nat. Inst. Standards Technol., Gaithersburg, MD 20899-8930, 2001.
Cited by
- A PSEUDO-RANDOM NUMBER GENERATOR EMPLOYING MULTIPLE RÉNYI MAPS vol.24, pp.11, 2013, https://doi.org/10.1142/s0129183113500794
- Diophantine Solutions Based Permutation for Image Encryption vol.7, pp.1, 2010, https://doi.org/10.1260/1748-3018.7.1.65
- A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps vol.75, pp.18, 2010, https://doi.org/10.1007/s11042-015-2851-7
- Chaotic Searchable Encryption for Mobile Cloud Storage vol.6, pp.2, 2010, https://doi.org/10.1109/tcc.2015.2511747
- New chaotical image encryption algorithm based on Fisher–Yatess scrambling and DNA coding vol.28, pp.4, 2010, https://doi.org/10.1088/1674-1056/28/4/040504
- Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption vol.2020, pp.None, 2010, https://doi.org/10.1155/2020/8274685
- A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation vol.31, pp.3, 2020, https://doi.org/10.1007/s11045-019-00689-w
- Scaling Analysis of an Image Encryption Scheme Based on Chaotic Dynamical Systems vol.23, pp.6, 2010, https://doi.org/10.3390/e23060672