1. Bogdanov, A., Khovratovich, D., & Rechberger, C. (2011). Biclique cryptanalysis of the full AES. In Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security (pp. 344–371). Berlin: Springer.
2. Éluard, M., Maetz, Y., & Doërr, G. (2013). Geometry-preserving encryption for 3D meshes. In Actes de Compression et REprsentation des Signaux Audiovisuels (pp. 7–12).
3. Jin, X., Chen, Y., Ge, S., Zhang, K., Li, X., Li, Y., et al. (2015). Color image encryption in CIE L*a*b* space. In International Conference on Applications and Techniques in Information Security (pp. 74–85). Berlin: Springer.
4. Jin, X., Tian, Y., Song, C., Wei, G., Li, X., Zhao, G., et al. (2015). An invertible and anti-chosen plaintext attack image encryption method based on DNA encoding and chaotic mapping. In 2015 Chinese Automation Congress (CAC) (pp. 1159–1164). Piscataway: IEEE.
5. Jin, X., Wu, Z., Song, C., Zhang, C., & Li, X. (2016). 3D point cloud encryption through chaotic mapping. In Advances in Multimedia Information Processing (PCM) 2016. Proceedings of the 17th Pacific-rim Conference on Multimedia (pp. 119–129). Cham: Springer.