[1] |
Wei Jun, Liao Xiaofeng, Wong Kwok-wo, et al. Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps[J]. Communications in Nonlinear Science and Numerical Simulation, 2007,12(5):814-822.
|
[2] |
Wang Xingyuan, Wang Xiaojuan, Zhao Jianfeng, et al. Chaotic encryption algorithm based on alternant of stream cipher and block cipher[J]. Nonlinear Dynamics, 2011,63(4):587-597.
|
[3] |
He Jun, Qian Haifeng, Zhou Yuan, et al. Cryptanalysis and improvement of a block cipher based on multiple chaotic systems[J]. Mathematical Problems in Engineering, 2010,2010: Article ID 590590.
|
[4] |
王继志,王英龙,王美琴. 一类基于混沌映射构造Hash函数方法的碰撞缺陷[J]. 物理学报, 2006,55(10):5048-5054.
|
[5] |
Liu Shubo, Sun Jing, Xu Zhengquan, et al. Digital chaotic sequence generator based on coupled chaotic systems[J]. Chinese Physics B, 2009,18(12):5219-5227.
|
[6] |
Gao Tiegang, Chen Zengqiang. A new image encryption algorithm based on hyper-chaos[J]. Physics Letters A, 2008,372(4):394-400.
|
[7] |
Rhouma R, Belghith S. Cryptanalysis of a new image encryption algorithm based on hyper-chaos[J]. Physics Letters A, 2008,372(38):5973-5978.
|
[8] |
王静,蒋国平. 一种超混沌图像加密算法的安全性分析及其改进[J]. 物理学报, 2011,60(6):83-93.
|
[9] |
卢辉斌,孙艳. 基于新的超混沌系统的图像加密方案[J]. 计算机科学, 2011,38(6):149-152.
|
[10] |
朱从旭,孙克辉. 对一类超混沌图像加密算法的密码分析与改进[J]. 物理学报, 2012,61(12):76-87.
|
[11] |
钟厚桥,李建民,林振荣,等. 基于超混沌序列的图像加密方案[J]. 计算机应用研究, 2013,30(10):3110-3113.
|
[12] |
Wang Haoxiang, Cai Guoliang, Miao Sheng, et al. Nonlinear feedback control of a novel hyperchaotic system and its circuit implementation[J]. Chinese Physics B, 2010,19(3):154-161.
|
[13] |
李玲,王伟男,李津杰,等. 基于Logistic映射和超混沌的自适应图像加密算法[J]. 微电子学与计算机, 2012,29(1):42-46.
|
[14] |
柏森,胡中豫,吴乐华,等. 通信信息隐匿技术[M]. 北京:国防工业出版社, 2006.
|
[15] |
朱从旭,胡玉平,孙克辉. 基于超混沌系统和密文交错扩散的图像加密新算法[J]. 电子与信息学报, 2012,34(7):1735-1743.
|
[16] |
Teng Lin, Wang Xingyuan. A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive[J]. Optics Communications, 2012,285(8):4048-4054.
|
[17] |
Zhu Zhiliang, Zhang Wei, Wong Kwok-wo, et al. A chaos-based symmetric image encryption scheme using a bit-level permutation[J]. Information Sciences, 2011,181(6):1171-1186.
|