Author:
Wang Yong,Liao Xiaofeng,Xiao Di,Wong Kwok-Wo
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference31 articles.
1. Cryptanalysis of dynamic look-up table based chaotic cryptosystems;Alvarez;Physics Letters A,2004
2. EC2C-PAKA: an efficient client-to-client password-authenticated key agreement;Byun;Information Sciences,2007
3. What every computer scientist should know about floating-point arithmetic;Goldberg;ACM Computing Surveys,1991
4. T. Habutsu, Y. Nishio, I. Sasase, S. Mori, A secret key cryptosystem by iteration a chaotic map, in: Proceedings of Eurocrypt’91, Brighton, UK, 1991, pp. 127–140.
5. Fingerprint images encryption via multi-scroll chaotic attractors;Han;Applied Mathematics and Computation,2007
Cited by
85 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献