参考文献/References:
[1] FENG Deng-guo,FENG Xiu-tao,ZHANG Wen-tao,et al.Loiss: A byte-oriented stream cipher[J].Lecture Notes in Computer Science,2011,6639,109-125.
[2] EKDAHL P,JOHANSSON T.A new version of the stream cipher SNOW[J].Lecture Notes in Computer Science,2002,2595,47-61.
[3] 刘年生,郭东辉.基于神经网络混沌吸引子的公钥密码算法安全性分析及其实现[J].厦门大学学报:自然科学版,2007,46(2):187-193.
[4] GAO Hui-xuan.Statistical computing[M].Beijing:Peking University Press,1996:80-120.
[5] MATTEIS A D,PAGNUTTI S.Long rang correlation in linear and nonlinear random number generation[J].Parallel Computing,1990,14(1):207-210.
[6] 崔嵬,李承恕.线性反馈移位寄存器的改进算法及其电路实现[J].北京交通大学学报,2004,28(5):69-72.
[7] HOPFIELD J J.Neurons, dynamics and computation[J].Physics Today,1994,47(2):40-46.
[8] LI Guo-gang,GUO Dong-hui.One-way property proof in public key cryptography based on OHNN[J].Procedia Engineering,2011,15(1/2):1812-1816.
[9] CHAN C K,CHENG L M.The convergence properties of a clipped Hopfield network and its application in the design of key stream generator[J].IEEE Trans Neural Networks,2001,12(2):340-348.
[10] 廖晓峰,肖迪,陈勇,等.混沌密码学原理及其应用[M].北京:科学出版社,2009:35-37,92-105,248-249.
[11] 张雪峰,范九伦.基于线性反馈移位寄存器和混沌系统的伪随机序列生成方法[J].物理学报,2010,59(4):2289-2297.
[12] 曾光,韩文报,斯雪明.字序列密码驱动部分设计分析[J].电子科技大学学报,2007,36(6):1485-1488.
[13] 何峥,李国刚.基于神经网口护盾吸引子的混合加密算法[J].通信技术,2012,45(5):49-52.
相似文献/References:
[1]蔺小梅,李国刚,张泽普.采用OHNN和M-LFSR的字序列密码加密方案[J].华侨大学学报(自然科学版),2015,36(预先出版):0.
LIN Xiao-mei,LI Guo-gang,ZHANG Ze-pu.An Word Oriented Encryption Scheme Based on OHNN and M-LFSR[J].Journal of Huaqiao University(Natural Science),2015,36(5):0.