[1]
|
A. Akhshani, A. Akhavan and A. Mobaraki, Pseudo random number generator based on quantum chaotic map, Communications in Nonlinear Science & Numerical Simulation, 19(2014)(1), 101-111.
Google Scholar
|
[2]
|
B. Chen, G. H. Liu and Y. Zhang, Hardware-realized method of chaotic encryption, Journal of UEST of China, 35(2006)(1), 32-35.
Google Scholar
|
[3]
|
B. X. Du, X. L. Geng and F. Y. Chen, Generation and realization of digital chaotic key sequence based on double K-L transform, Chinese Journal of Electronics, 22(2013)(1), 131-134.
Google Scholar
|
[4]
|
C. Han and K. R. Wang, Design and realization of embedded system network interface based on DM9000, Industrial Control Computer, 20(2007)(4), 17-18.
Google Scholar
|
[5]
|
G. J. Hu and Z. J. Feng, Security property of a class of digital chaotic encryption system, Journal of Electronics and Information Technology, 25(2003)(11), 1514-1518.
Google Scholar
|
[6]
|
Q. Liu, J. Q. Fang and G. Zhao, Research of chaotic encryption system based on FPGA technology, Acta Physica Sinica, 61(2012)(13), 1-6.
Google Scholar
|
[7]
|
A. Shrobek, Cryptanalysis of chaotic stream cipher, Physics letters A, 363(2007)(1), 84-90.
Google Scholar
|
[8]
|
X. M. Wang, W. F. Zhang and W. Guo, Secure chaotic system with application to chaotic ciphers, Information Sciences, 221(2013)(1), 555-570.
Google Scholar
|
[9]
|
T. Y. Wu and Y. M. Tseng, Publicly veriable multi-secret sharing scheme from bilinear pairings, IET Information Security, 7(2013)(3), 239-246.
Google Scholar
|
[10]
|
T. Y. Wu, T. T. Tsai and Y. M. Tseng, Ecient searchable ID-based encryption with a designated server, Annals of Telecommunications, 69(2014)(7), 391-402.
Google Scholar
|
[11]
|
T. Y. Wu, Y. M. Tseng and T. T. Tsai, A revocable ID-based authenticated group key exchange protocol with Resistant to malicious participants, Computer Networks, 56(2012)(12), 2994-3006.
Google Scholar
|
[12]
|
Y. B. Zheng, J. Pan and Y. Song, Research on the quantifications of chaotic random number generator, International Journal of Sensor Networks, 15(2014)(1), 139-143.
Google Scholar
|
[13]
|
Y. F. Zhou, L. W. Li and L. L. Zou, Practical Tutorial of Embedded Linux, Publishing House of electronics Industry, beijing, 2014.
Google Scholar
|
[14]
|
Y. Zhou, C. Y. Zhu and Y. M. Wang, Study on the performances of logistic digital chaotic sequences, Modern Electronics Technique, 19(2006)(9), 69-71.
Google Scholar
|