Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference31 articles.
1. Shanon C (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715
2. Webster AF, Tavares SE (1986) On the design of S-boxes. In: Williams HC (ed) Advances in cryptology—CRYPTO’85. Lecture notes in computer science, vol 219. Springer, Berlin, Heidelberg, pp 523–534
3. Binder PM, Jensen RV (1986) Simulating chaotic behavior with finite-state machines. Phys Rev A 34:4460–4462
4. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16:2129–2151
5. Alvarez G, Amigó JM, Arroyo D, Li S (2011) Lessons learnt from cryptanalysis of chaos-based ciphers, in chaos-based cryptography. Theory, algorithms and applications. Stud Comput Intell 354:257–295
Cited by
61 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献