1. Fridrich J. (1998), Symmetric ciphers based on two-dimensional chaotic maps, International Journal of Bifurcation and Chaos, Volume 8(6), 1259–1284.
2. Anoop(2007), Public key cryptography—applications algorithm and mathematical explanations.
3. Thongpon, T., & Sinchai, K. (2009). Accelerating asymmetric-key cryptography using parallel-key cryptographic algorithm. 6th International Conference on Computer and Information Technology, 2, 812–815.
4. Ljupco Kocarev(2002), Chaos-based cryptography: a brief overview, IEEE Circuits and Systems Magazine, pp 7-21.
5. Azzaz, M. S., Tanougast, C., Sadoudi, S., & Bouridane, A. (2013). Synchronized hybrid chaotic generators: application to real-time wireless speech encryption. Elsevier: Communications in Nonlinear Science Numerical Simulation, Volume, 18, 2035–2047.