[1]ZOU A-jin,ZHANG Yu-nong,XIAO Xiu-chun.An asynchronous encryption algorithm based on Hermite chaotic neural networks[J].CAAI Transactions on Intelligent Systems,2009,4(5):458-462.[doi:10.3969/j.issn.1673-4785.2009.05.012]
Copy

An asynchronous encryption algorithm based on Hermite chaotic neural networks

References:
[1]PECORA L M, CARROLL T L. Synchronization in chaotic system[J]. Physical Review Letters, 1990, 64(8): 821-824.
[2]CROUNSE K R, YANG T, CHUA L O. Pseudo-random sequence generation using the CNN universal machine with applications to cryptography[C]//Proceedings of the IEEE Intemational Workshop on Cellular Neural Networks and Their Applications. Singapore: World Scientific Press, 1996: 433-438.
[3]MILANOVIC V, ZAQHLOUL M E. Synchronization of chaotic neural networks for secure communications[J]. IEEE Intemational Symposium on Circuits and Systems, 1996, 3: 28-31.
[4]GUO D, CHEN L M, CHEN L L. A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks[J]. Applied Intelligence, 1999, 10: 71-84.
[5]王??? 喆,陈?? 玲,朱双鹤. 基于径向基函数神经网络的混沌加密方案[J].空军工程大学学报, 2003, 4(3): 54-57.
?WANG Zhe, CHEN Ling, ZHU Shuanghe. Chaotic encryption based on RBF neural networks[J]. Journal of Air Force Engineering University, 2003, 4(3): 54-57.
[6]齐?? 锐, 张大力, 阎平凡. 基于神经网络的对称密码系统[J]. 清华大学学报:自然科学版, 2001, 41(9): 89-93.
QI Rui, ZHANG Dali, YAN Pingfan. A symmertic cryptosystem by neural network[J]. Journal of Tsinghua University: Science and Technology, 2001, 41(9): 89-93.
[7]姜??? 丽, 杨明福, 黄桂敏. 一种基于神经网络的多级混沌加密算法[J]. 计算机应用与软件, 2006, 23(8):106-108.
?JIANG Li, YANG Mingfu, HUANG Guimin. A multistage chaotic encryption algorithm based on neural network[J]. Computer Applications and Software, 2006, 23(8):106-108.
[8]YANG Tao. Chaotic secure communication systems: history and new results[J]. Telecommunication Review, 1999, 9(4): 597-634.
[9]YANG T, WU C W, CHUA L O. Cryptography based on chaosic systems[J]. IEEE Transactions on Circuits and System: Fundamental Teheory and Apphcations, 1997, 44(5): 469-472.
[10]刘年生, 郭东辉, 吴伯僖. 混沌神经网络及其在保密通讯中的应用[J]. 电讯技术, 2002, 5:141-147.
LIU Niansheng, GUO Donghui, WU Boxi. A symmetric block encryption sheme based on chaotic series of neural networks[J]. Telecommunication Engineering, 2002, 5:141-147.
[11]张雨浓, 陈扬文, 易称福, 等. Hermite正交基前向神经网络的权值直接确定法[J]. 甘肃科学学报, 2008, 20(1):82-86.
?ZHANG Yunong, CHEN Yangwen, YI Chengfu, et al. Feedforward neural network activated with Hermite orthogonal polynomials and its weightsdetermination method[J]. Journal of Gansu Sciences, 2008, 20(1): 82-86.
[12]SHANNON C E. Communication theory of secrecy system [J]. Bell Syst Tech J, 1949, 28: 656-715.
Similar References:

Memo

-

Last Update: 2009-12-29

Copyright © CAAI Transactions on Intelligent Systems