参考文献/References:
[1] ALANAZI H O,ZAIDAN B B,ZAIDAN A A,et al.New comparative study between DES, 3DES and AES within nine factors[J].Computer Science,2010,3(2):152-157.
[2] ANEES A,SIDDIQUI A M,AHMED F.Chaotic substitution for highly autocorrelated data in encryption algorithm[J].Communications in Nonlinear Science and Numerical Simulation,2014,19(9):3106-3118.DOI:10.1016/j.cnsns.2014.02.011.
[3] BARENGHI A,BERTONI G M,BREVEGLIERI L,et al.A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA[J].Journal of Systems and Software,2013,86(7):1864-1878.DOI:10.1016/j.jss.2013.02.021.
[4] HU Hanping,LIU Lingfeng,DING Naida.Pseudorandom sequence generator based on the Chen chaotic system[J].Computer Physics Communications,2013,184(3):765-768.DOI:10.1016/j.cpc.2012.11.017.
[5] AHMAD M,ALAM B,FAROOQ O.Chaos based mixed keystream generation for voice data encryption[J].International Journal on Cryptography and Information Security,2012,2(1):39-48.
[6] AZZAZ M S,TANOUGAST C,SADOUDI S,et al.Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption[J].Communications in Nonlinear Science and Numerical Simulation,2013,18(8):2035-2047.DOI:10.1016/j.cnsns.2012.12.018.
[7] LEHMER D H.Mathematical methods in large-scale computing units[C]//Proceedings of a Second Symposium on Large-Scale Digital Calculating Machinery.Cambridge:Harvard University Press,1951:141-146.
[8] VAJARGAH B F,ASGHARI R.A pseudo random number generator based on chaotic henon map(CHCG)[J].IJMEC,2015,5(15):2120-2129.DOI:649123/10134.
[9] RUKHIN A,SOTO J,NECHVATAL J,et al.A statistical test suite for random and pseudorandom number generators for cryptographic applications[J].Applied Physics Letters,2015,22(7):1645-1679.DOI:10.1063/1.4928732.
[10] 张伟伟.通信系统中语音质量评价的研究[D].北京:北京邮电大学,2014.