[1] Akhshani, A., Akhavan, A., Lim, S.-C., Hassan, Z.:
An image encryption scheme based on quantum logistic map. Commun. Nonlinear Sci. Numer. Simul. 17 (2012), 4653-4661.
DOI
[2] Alvarez, G., Li, S.:
Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcation Chaos 16 (2006), 2129-2151.
DOI
[3] Alvarez, G., Montoya, F., Romera, M., Pastor, G.:
Cryptanalysis of an ergodic chaotic cipher. Phys. Lett. A 311 (2003), 172-179.
DOI
[4] Bertoni, G., Daemen, J., Peeters, M., Assche, G. Van: Sponge-based pseudo-random number generators. In: Cryptographic Hardware and Embedded Systems (CHES), Springer, Berlin 2010, pp. 33-47.
[5] Björk, T.: Arbitrage Theory in Continuous Time. Oxford Univ. Press, Oxford 2009.
[6] Charif, K., Drissi, A., Guennoun, Z. E. A.: A pseudo random number generator based on chaotic billiards. A. A. 3 (2017), 2.
[7] Charif, K., Guennoun, Z. E. A.:
A novel image encryption algorithm based on chaotic billiards. J. Discrete Math. Sci. Cryptogr. 24 (2021), 129-154.
DOI 10.1080/09720529.2019.1675302
[8] Chen, S., Lü, J.:
Parameters identification and synchronization of chaotic systems based upon adaptive control. Phys. Lett. A 299 (2002), 353-358.
DOI
[9] Deepthi, P. P., Nithin, V. S., Sathidevi, P. S.:
Implementation and analysis of stream ciphers based on elliptic curves. Comput. Electr. Eng. 35 (2009), 300-314.
DOI
[10] Fridrich, J.:
Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation Chaos 8 (1998), 1259-1284.
DOI 10.1142/S021812749800098X
[11] Fu, C., Chen, J. J., Zou, H., Meng, W. H., Zhan, Y. F., Yu, Y. W.:
A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt. Express 20 (2012), 2363-2378.
DOI
[12] Hamdi, M., Rhouma, R., Belghith, S.:
Selective compression-encryption of images based on SPIHT coding and Chirikov standard map. Signal Process. 131 (2017), 514-526.
DOI
[13] Higham, D. J.:
An algorithmic introduction to numerical simulation of stochastic differential equations. SIAM Rev. 43 (2001), 525-546.
DOI
[14] Indrakanti, S. P., Avadhani, P. S.:
Permutation based image encryption technique. Int. J. Comput. Appl. 28 (2011), 45-47.
DOI
[15] Jolfaei, A., Wu, X.-W., Muthukkumarasamy, V.:
On the security of permutation-only image encryption schemes. IEEE Trans. Inf. Forensics Security 11 (2015), 235-246.
DOI
[16] Joshi, M., Shakher, C., Singh, K.:
Image encryption and decryption using fractional Fourier transform and radial Hilbert transform. Opt. Laser Eng. 46 (2008), 522-526.
DOI 10.1016/j.optlaseng.2008.03.001
[17] Khan, J., Ahmad, J., Hwang, S. O.: An efficient image encryption scheme based on Henon map, skew tent map and S-Box. In: ICMSAO 2015, IEEE, pp. 1-6.
[18] Kocarev, L., Jakimoski, G., Stojanovski, T., Parlitz, U.: From chaotic maps to encryption schemes. In: ISCAS (1998), IEEE, pp. 514-517.
[19] Krishna, P. R., Teja, C. V S., Thanikaiselvan, V.: A chaos-based image encryption using Tinkerbell map functions. In: ICECA (2018), IEEE, pp. 578-582.
[20] Langevin, P.: Sur la théorie du mouvement Brownien. C. R. Acad. Sci. Paris 146 (1908), 530-533.
[21] Li, C., Arroyo, D., Lo, K.-T.:
Breaking a chaotic cryptographic scheme based on composition maps. Int. J. Bifurcation Chaos 20 (2010), 2561-2568.
DOI
[22] Li, C., Liu, Y., Zhang, L. Y., Chen, M. Z. Q.:
Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation. Int. J. Bifurcation Chaos 23 (2013), 1350075.
DOI
[23] Li, S., Li, Q., Li, W., Mou, X., Cai, Y.: Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding. In: Cryptography and Coding (IMA), Springer, Berlin (2001), pp. 205-221.
[24] Mandal, M. K., Banik, G. D., Chattopadhyay, D., Nandi, D.:
An image encryption process based on chaotic logistic map. IETE Tech. Rev. 29 (2012), 395-404.
DOI
[25] Mitra, A., Rao, Y. V. S., Prasanna, S. R. M.: A new image encryption approach using combinational permutation techniques. Int. J. Comput. Sci. 1 (2006), 127-131.
[26] Nouar, C., Guennoun, Z. E. A.:
A pseudo-random number generator using double pendulum. Appl. Math. 14 (2020), 977-984.
DOI
[27] Omary, F.: Application des algorithmes évolutionnistes à la cryptographie. Univ. Mohammed V-Agdal, Rabat 2006.
[28] Pandey, D., Rawat, U. S., Kumar, A.:
Robust progressive block based visual cryptography with chaotic map. J. Discrete Math. Sci. Cryptogr. 19 (2016), 1025-1040.
DOI
[29] Papadopoulos, H. E., Wornell, G. W.:
Maximum-likelihood estimation of a class of chaotic signals. IEEE Trans. Inf. Theory 41 (1995), 312-317.
DOI
[30] Pareek, N. K., Patidar, V., Sud, K. K.:
Image encryption using chaotic logistic map. Image Vision Comput. 24 (2006), 926-934.
DOI
[31] Schindler, W.: Random number generators for cryptographic applications. In: Cryptographic Engineering, Springer, Berlin (2009), pp. 5-23.
[32] Shannon, C. E.:
A mathematical theory of communication. Bell Syst. Tech. J. 27 (1948), 379-423.
DOI |
Zbl 1154.94303
[33] Shannon, C. E.:
Communication theory of secrecy systems. Bell Syst. Tech. J. 28 (1949), 656-715.
DOI
[34] Sharma, M., Kowar, M., Sharma, M.:
An improved evolutionary algorithm for secured image using adaptive genetic algorithm. J. Discrete Math. Sci. Cryptogr. 11 (2008), 673-683.
DOI
[35] Skrobek, A.:
Cryptanalysis of chaotic stream cipher. Phys. Lett. A 363 (2007), 84-90.
DOI
[36] Skrobek, A.:
Approximation of a chaotic orbit as a cryptanalytical method on Baptista’s cipher. Phys. Lett. A 372 (2008), 849-859.
DOI
[37] Uhlenbeck, G. E., Ornstein, L. S.:
On the theory of the Brownian motion. Phys. Rev. 36 (1930), 823.
DOI
[39] Wang, X., Xu, D.:
A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn. 75 (2014), 345-353.
DOI
[40] Wu, X., Hu, H., Zhang, B.:
Parameter estimation only from the symbolic sequences generated by chaos system. Chaos Solitons Fractals 22 (2004), 359-366.
DOI
[41] Wu, Y., Zhou, Y., Agaian, S., Noonan, J. P.:
A symmetric image cipher using wave perturbations. Signal Process. 102 (2014), 122-131.
DOI
[42] Xiao, G., Lu, M., Qin, L., Lai, X.:
New field of cryptography: DNA cryptography. Chin. Sci. Bull. 51 (2006), 1413-1420.
DOI
[43] Xiaofu, W., Songgeng, S.:
A general efficient method for chaotic signal estimation. IEEE Trans. Signal Process. 47 (1999), 1424-1428.
DOI
[44] Zhen, W., Xia, H., Yu-Xia, L., Xiao-Na, S.:
A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system. Chin. Phys. B 22 (2013), 010504.
DOI
[45] Zhu, C., Xu, S., Hu, Y., Sun, K.:
Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn. 79 (2015), 1511-1518.
DOI