[1]马华, 张晓清, 张鹏鸽. 一种基于线性同余算法的伪随机数产生器[J]. 纯粹数学与应用数学, 2005, 21(3):206209.
[2]Matthews R. On the Derivation of a “Chaotic” Encryption Algorithm[J]. Cryptologia,1989, 13(1):2942.
[3]Stern J. Secret Linear Congruential Generators are not Cryptographically Secure[C]∥Proc of the 28th Annual Symp on Foundations Computer Science, 1987:421426.
[4]Krawczyk H.How to Predict Congruential Generators[C]∥Proc of CRYPTO’89, 1989:138153.
[5]Katti R S, Kavasseri R G, Sai V. Pseudorandom Bit Generation Using Coupled Congruential Generators[J]. IEEE Transactions and SystemsII: Express Briefs, 2010, 57(3):203207.
[6]周红. 有限精度混沌系统的m序列扰动实现[J]. 电子学报, 1997, 25(7):95101.
[7]ZHOU Liangqiang, CHEN Fangqi, CHEN Yushu. Chaotic Behavior on Reduction of Perturbed KdV Equation in form of Parametric Excitation[J]. Trans of Nanjing University of Aeronautics & Astronautics, 2007, 24(4):283287.
[8]高洁, 袁家斌, 徐涛. 一种基于混合反馈的混沌图像加密算法[J]. 计算机应用, 2008, 28 (2):434436.
[9]张雪峰, 范九伦. 基于线性反馈移位寄存器和混沌系统的伪随机序列生成方法[J]. 物理学报, 2010, 59(4):22892297.
[10]Kocarev L, Maggio G M, Ogorzalek M J. Special Issue on Application of Chaos in Modern Communication Systems[J]. IEEE Trans on Circuits and Systems: Fundamental Theory and Applications, 2001, 48(12):13941404. |