Author:
Ghebleh M.,Kanso A.,Noura H.
Subject
Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Signal Processing,Software
Reference51 articles.
1. Handbook of Applied Cryptography;Menezes,1997
2. The Design of Rijndael;Daemen,2002
3. T. Habutsu, Y. Nishio, I. Sasase, S. Mori, A secret key cryptosystem by iterating a chaotic map, in: Advances in Cryptology: Proceedings of EUROCRYPT 91, Lecture Notes in Computer Science, vol. 547, Springer, Berlin, Heidelberg, 1991, pp. 127–140.
4. Cryptography with chaos;Baptista;Physics Letters A,1998
5. Chaos and cryptography;Jakimoski;IEEE Transactions on Circuits and Systems-I,2001
Cited by
77 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献