Analysis of effectiveness of measures for concealment of information in communication systems and networks by chaotic dynamics methods
PTITSYN, N.I. Application of the Deterministic Chaos Theory in Cryptography [in Russian]. Moscow: MGTU, 2002.
KOCAREV, L. "Chaos-based cryptography: a brief overview," IEEE Circuits Systems Mag., v.1, n.3, р.6-21, 2001. DOI: https://doi.org/10.1109/7384.963463.
KOCAREV, L.; TASEV, Z. "Public-key encryption based on Chebyshev maps," Proc. of Int. Symp. on Circuits and Systems, 25-28 May 2003, Bangkok, Thailand. IEEE, 2003, v.3, р.28-31. DOI: https://doi.org/10.1109/ISCAS.2003.1204947.
MASUDA, N.; AIHARA, K. "Cryptosystems with discretized chaotic maps," IEEE Trans. Circuits, Syst. I: Fund. Theory Applications, v.49, n.1, р.28-39, 2002. DOI: https://doi.org/10.1109/81.974872.
KOTULSKI, Zbigniew; SZCZEPAŃSKI, Janusz; GÓRSKI, Karol; PASZKIEWICZ, Andrzej; ZUGAJ, Anna. "Application of discrete chaotic dynamical systems in cryptography — DCC method," Int. J. Bifurcation Chaos, v.9, n.6, р.1121-1135, 1999. DOI: https://doi.org/10.1142/S0218127499000778.
DIFFIE, W.; HELLMAN, M.E. "New directions in cryptography," IEEE Trans. Inf. Theory, v.22, n.6, р.644-654, 1976. DOI: https://doi.org/10.1109/TIT.1976.1055638.
COWIE, James; DODSON, Bruce; ELKENBRACHT-HUIZING, R. Marije; LENSTRA, Arjen K.; MONTGOMERY, Peter L.; ZAYER, Jörg. "A world wide number field Sieve factoring record: on to 512 Bits," Proc. ASIACRYPT’96, Nov. 1996. DOI: https://doi.org/10.1007/BFb0034863.
ODLYZKO, A. "The future of integer factorization," CryptoBytes, Sum. 1995.
WIENER, M.J. "Cryptoanalysis of short RSA secret exponents," IEEE Trans. Inf. Theory, v.36, n.3, p.553-558, 1990. DOI: https://doi.org/10.1109/18.54902.
RIVEST, R.L.; SHAMIR, A.; ADLEMAN, L. "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, v.21, n.2, p.120-126, 1978. DOI: https://doi.org/10.1145/359340.359342.
The Federal Information Processing Standard. FIPS PUB 186, NIST USA, 1996.
ELGAMAL, T. "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, v.31, n.4, р.469-472, 1985. DOI: https://doi.org/10.1109/TIT.1985.1057074.
SCHNORR, C.P. "Efficient signature generation by smart cards," J. Cryptology, v.4, n.3, p.161-174, 1991. DOI: https://doi.org/10.1007/BF00196725.
KOTULSKI, Z.A.; SZCZEPANSKI, Janusz; GÓRSKI, Karol; GÓRSKA, Anna; PASZKIEWICZ, Andrzej. "On constructive approach to chatic pseudorandom number generators," Proc. of Regional Conf. on Military Communication and Information Systems, CIS Solutions for an Enlarged NATO, RCMIS 2000.
MOON, F.C. Chaotic Vibrations. An Introduction for Applied Scientists and Engineers. Wiley, 1987.
KOHDA, T.; YOSHIMURA, T. "Statistical attack on chaos-based Elgamal public key system," Proc. of IEEE Symp. on Circuits and Systems, ISCAS 2004, IEEE, 2004, p. 1-13.
STALLINGS, W. Cryptography and Network Security. Principles and Practice, 2nd ed. Prentice Hall, 1998.