Zhongwei Hou∗ and Dengyuan Xu∗∗


  1. [1] L. Kocarev, Chaos-based cryptography: a brief overview, IEEECircuits and Systems Magazine, 1, 2001, 6–21.
  2. [2] J.J. Ni and S.X. Yang, A fuzzy-logic based chaos GA forcooperative foraging of multi-robots in unknown environments,International Journal of Robotics and Automation, 27, 2012,15–30.
  3. [3] S. Nasr, H. Mekki, and K. Bouallegue, A fast path planningmethod of robot for surveillance missions based on chaos,International Journal of Robotics and Automation, 34, 2019,468–476.
  4. [4] A. Kannammal and S.S. Rani, Authentication and encryptionfor medical image security system, International Journal ofRobotics and Automation, 29, 2014, 448–455.
  5. [5] A.U. Rehman, X.F. Liao, and H.W. Wang, An innovativetechnique for image encryption using tripartite graph andchaotic maps, Multimedia Tools and Applications, 80, 2021,21979–22005.
  6. [6] Y.L. Ma, C.Q. Li, and B. Ou, Cryptanalysis of an imageblock encryption algorithm based on chaotic maps, Journal ofInformation Security and Applications, 54, 2020, 102566.
  7. [7] H. Tourajizadeh, M. H. Korayem, and S.R. Nekoo, Sensitivityanalysis of dynamic load carrying capacity of a cable-suspendedrobot, International Journal of Robotics and Automation, 34,2019, 1–11.
  8. [8] C.Q. Li, B.B. Feng, S.J. Li, J. Kurths, and G.R. Chen,Dynamic analysis of digital chaotic maps via state-mappingnetworks, IEEE Transactions on Circuits and Systems I:, 66,2019, 2322–2335.
  9. [9] D. Xiao, M. Li, M.D. Wang, J. Liang, and R. Liu, Low-costand high-efficiency privacy protection scheme for distributedcompressive video sensing in wireless multimedia sensor net-works, Journal of Network and Computer Applications, 161,2020, 102654.
  10. [10] J.Z. Xin, H. Zhang, J.T. Zhou, X.G. Li, and H. Ma, Damageidentification of bridge system based on a hybrid algorithm,International Journal of Robotics and Automation, 34(2),2019, 104–111.
  11. [11] H. Wang, D. Xiao, M. Li, Y.P. Xiang, and X.Y. Li, A visuallysecure image encryption scheme based on parallel compressivesensing, Signal Processing, 155, 2019, 218–232.
  12. [12] V. Arnold and A. Avez, Ergodic problems of classical mechanics(New York: Benjamin, USA, 1968).
  13. [13] G.R. Chen, Y.B. Mao, and C.K. Chui, A symmetric imageencryption scheme based on 3D chaotic cat maps, Chaos,Solitons & Fractals, 21, 2004, 749–761.
  14. [14] F. Chen, K.W. Wong, X.F. Liao, and T. Xiang, Perioddistribution of chaotic cat map for N = pe, IEEE Transactionson Information Theory, 58, 2012, 445–452.
  15. [15] F. Chen, X.F. Liao, K.W. Wong, Q. Han, and Y. Li, Perioddistribution of some linear maps, Communications in NonlinearScience and Numerical Simulation, 17, 2012, 3848–3856.
  16. [16] F. Chen, K.W. Wong, X.F. Liao, and T. Xiang, Perioddistribution of chaotic cat map for N = 2e, IEEE Transactionson Information Theory, 59, 2013, 3249–3255.
  17. [17] R. Lidl and H. Niederreiter, Finite Fields, vol. 20, encyclopediaof mathematics and its applications (Amsterdam: Addison-Wesley, The Netherlands, 1983).
  18. [18] Z.X. Wan, Lectures on finite fields and galois rings (Singapore:World Scientific, 2003).
  19. [19] F. Chen, K.W. Wong, X.F. Liao, and T. Xiang, Perioddistribution of chaotic cat map,” Theoretical Computer Science,552, 2014, 13–25.
  20. [20] R.A. Rueppel, Analysis and design of stream ciphers (NewYork, USA: Springer-Verlag, 1986).
  21. [21] X.F Liao, F. Chen, and K.W. Wong, On the security of public-key algorithms based on chebyshev polynomials over the finitefield, IEEE Transactions on Computers, 59, 2010, 1392–1401.171
  22. [22] S. Golomb and L. Welch, Shift register sequences (LagunaHills, CA: Aegean Park, 1982).
  23. [23] S. Golomb and G. Gong, Signal design for good correlation: forwireless communication, cryptography, and radar (Cambridge,UK: Cambridge Univ. Press, 2005).
  24. [24] F. Chen, X.F. Liao, T. Xiang, and H.Y. Zheng, Securityanalysis of the public key algorithm based on Chebyshevpolynomials over the integer ring, Information Sciences, 181,2011, 5110–5118.
  25. [25] T. Kruger and S. Troubetzkoy, Complexity, randomness, dis-cretization: Some remarks on a program of J. Ford, PhysicaD, 105, 2011, 97–104.
  26. [26] P.W. Shor, Polynomial-time algorithms for prime factorizationand discrete logarithms on a quantum computer, SIAM Journalon Computing, 26, 1997, 1484–1509.

Important Links:

Go Back