1. Ogorzatek M J, Dedieu H. Some tools for attacking secure communication systems employing chaotic carriers. In: Proceedings of the 1998 IEEE Symposium on Circuits and Systems, Monterey, 1998, 522–525
2. Alvarez G, Montoya F, Romera M, et al. Breaking two secure communication systems based on chaotic masking. IEEE Trans Circ Syst, 2004, 51(10): 505–506
3. Hu G J, Feng Z J, Meng R L. Chosen ciphertext attack on chaos communication based on chaotic synchronization. IEEE Trans Circ Syst, 2003, 50(20): 275–279
4. Ma Z G, Qiu S S. An image cryptosystem based on general cat map. J China Inst Commun (in Chinese), 2003, 24(2): 51–57
5. Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos, 1998, 8(6): 1259–1284