[1] Wei Jun, Liao Xiaofeng, Wong Kwok-wo, et al. Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps[J]. Communications in Nonlinear Science and Numerical Simulation, 2007,12(5):814-822.
[2] Wang Xingyuan, Wang Xiaojuan, Zhao Jianfeng, et al. Chaotic encryption algorithm based on alternant of stream cipher and block cipher[J]. Nonlinear Dynamics, 2011,63(4):587-597.
[3] He Jun, Qian Haifeng, Zhou Yuan, et al. Cryptanalysis and improvement of a block cipher based on multiple chaotic systems[J]. Mathematical Problems in Engineering, 2010,2010: Article ID 590590.
[4] 王继志,王英龙,王美琴. 一类基于混沌映射构造Hash函数方法的碰撞缺陷[J]. 物理学报, 2006,55(10):5048-5054.
[5] Liu Shubo, Sun Jing, Xu Zhengquan, et al. Digital chaotic sequence generator based on coupled chaotic systems[J]. Chinese Physics B, 2009,18(12):5219-5227.
[6] Gao Tiegang, Chen Zengqiang. A new image encryption algorithm based on hyper-chaos[J]. Physics Letters A, 2008,372(4):394-400.
[7] Rhouma R, Belghith S. Cryptanalysis of a new image encryption algorithm based on hyper-chaos[J]. Physics Letters A, 2008,372(38):5973-5978.
[8] 王静,蒋国平. 一种超混沌图像加密算法的安全性分析及其改进[J]. 物理学报, 2011,60(6):83-93.
[9] 卢辉斌,孙艳. 基于新的超混沌系统的图像加密方案[J]. 计算机科学, 2011,38(6):149-152.
[10] 朱从旭,孙克辉. 对一类超混沌图像加密算法的密码分析与改进[J]. 物理学报, 2012,61(12):76-87.
[11] 钟厚桥,李建民,林振荣,等. 基于超混沌序列的图像加密方案[J]. 计算机应用研究, 2013,30(10):3110-3113.
[12] Wang Haoxiang, Cai Guoliang, Miao Sheng, et al. Nonlinear feedback control of a novel hyperchaotic system and its circuit implementation[J]. Chinese Physics B, 2010,19(3):154-161.
[13] 李玲,王伟男,李津杰,等. 基于Logistic映射和超混沌的自适应图像加密算法[J]. 微电子学与计算机, 2012,29(1):42-46.
[14] 柏森,胡中豫,吴乐华,等. 通信信息隐匿技术[M]. 北京:国防工业出版社, 2006.
[15] 朱从旭,胡玉平,孙克辉. 基于超混沌系统和密文交错扩散的图像加密新算法[J]. 电子与信息学报, 2012,34(7):1735-1743.
[16] Teng Lin, Wang Xingyuan. A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive[J]. Optics Communications, 2012,285(8):4048-4054.
[17] Zhu Zhiliang, Zhang Wei, Wong Kwok-wo, et al. A chaos-based symmetric image encryption scheme using a bit-level permutation[J]. Information Sciences, 2011,181(6):1171-1186. |