0712.3964/IVC2.bbl
1: \begin{thebibliography}{10}
2: \expandafter\ifx\csname url\endcsname\relax
3:   \def\url#1{\texttt{#1}}\fi
4: \expandafter\ifx\csname urlprefix\endcsname\relax\def\urlprefix{URL }\fi
5: 
6: \bibitem{Yen:CKBA:ISCAS2000}
7: J.-C. Yen, J.-I. Guo, A new chaotic key-based design for image encryption and
8:   decryption, in: Proc. IEEE Int. Conf. Circuits and Systems, Vol.~4, 2000, pp.
9:   49--52.
10: 
11: \bibitem{Chen&Yen:RCES:JSA2003}
12: H.-C. Chen, J.-C. Yen, A new cryptography system and its {VLSI} realization, J.
13:   Systems Architecture 49 (2003) 355--367.
14: 
15: \bibitem{Chen-Guo-Huang-Yen:TDCEA:EURASIP2003}
16: H.-C. Chen, J.-I. Guo, L.-C. Huang, J.-C. Yen, Design and realization of a new
17:   signal security system for multimedia data transmission, EURASIP Journal on
18:   Applied Signal Processing 2003~(13) (2003) 1291--1305.
19: 
20: \bibitem{YaobinMao:CSF2004}
21: G.~Chen, Y.~Mao, C.~K. Chui, A symmetric image encryption scheme based on {3D}
22:   chaotic cat maps, Chaos, Solitons \& Fractals 21~(3) (2004) 749--761.
23: 
24: \bibitem{Pareek:ImageEncrypt:IVC2006}
25: N.~Pareek, V.~Patidar, K.~Sud, Image encryption using chaotic logistic map,
26:   Image and Vision Computing 24~(9) (2006) 926--934.
27: 
28: \bibitem{Li:PermutationAnalysis:2004}
29: S.~Li, C.~Li, G.~Chen, N.~G. Bourbakis, K.-T. Lo, A general cryptanalysis of
30:   permutation-only multimedia encryption algorithms, Cryptology ePrint Archive,
31:   Report 2004/374, \url{http://eprint.iacr.org/2004/374} (2004).
32: 
33: \bibitem{Li:AttackTDCEA2005}
34: C.~Li, S.~Li, G.~Chen, G.~Chen, L.~Hu, Cryptanalysis of a new signal security
35:   system for multimedia data transmission, EURASIP Journal on Applied Signal
36:   Processing 2005~(8) (2005) 1277--1288.
37: 
38: \bibitem{Li-Zheng:CKBA:ISCAS2002}
39: S.~Li, X.~Zheng, Cryptanalysis of a chaotic image encryption method, in: Proc.
40:   IEEE Int. Symposium on Circuits and Systems, Vol.~II, 2002, pp. 708--711.
41: 
42: \bibitem{Li:AttackingRCES2004}
43: S.~Li, C.~Li, G.~Chen, K.-T. Lo, Cryptanalysis of {RCES/RSES} image encryption
44:   scheme, J. Systems and Software, in press, doi:10.1016/j.jss.2007.07.037
45:   (2007).
46: 
47: \bibitem{Li:AttackingIVC2007}
48: C.~Li, S.~Li, M.~Asim, J.~Nunez, G.~Alvarez, G.~Chen, On the security defects
49:   of an image encryption scheme, IACR's Cryptology ePrint Archive: Report
50:   2007/397, available online at \url{http://eprint.iacr.org/2007/397} (2007).
51: 
52: \bibitem{ShujunLi:ChaosImageVideoEncryption:Handbook2004}
53: S.~Li, G.~Chen, X.~Zheng, Chaos-based encryption for digital images and videos,
54:   in: B.~Furht, D.~Kirovski (Eds.), Multimedia Security Handbook, CRC Press,
55:   LLC, 2004, Ch.~4, pp. 133--167, the preprint is available at
56:   \url{http://www.hooklee.com/pub.html}.
57: 
58: \bibitem{AlvarezLi:Rules:IJBC2006}
59: G.~Alvarez, S.~Li, Some basic cryptographic requirements for chaos-based
60:   cryptosystems, Int. J. Bifurcation and Chaos 16~(8) (2006) 2129--2151.
61: 
62: \bibitem{Tong:ImageCipher:IVC07}
63: X.~Tong, M.~Cui, Image encryption with compound chaotic sequence cipher
64:   shifting dynamically, Image and Vision Computing, in press,
65:   doi:10.1016/j.imavis.2007.09.005 (2007).
66: 
67: \bibitem{FIPS1402:2002}
68: NIST, Security requirements for cryptographic modules, Federal Information
69:   Processing Standards Publication (FIPS PUB) 140-2, available online at
70:   \url{http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf} (2002).
71: 
72: \bibitem{FIPS1401:1994}
73: NIST, Security requirements for cryptographic modules, Federal Information
74:   Processing Standards Publication (FIPS PUB) 140-1, available online at
75:   \url{http://csrc.nist.gov/publications/fips/fips140-1/fips1401.pdf} (1994).
76: 
77: \bibitem{MOV:CyrptographyHandbook1996}
78: A.~Menezes, P.~van Oorschot, S.~Vanstone, Handbook of Applied Cryptography, CRC
79:   Press, 1996.
80: 
81: \bibitem{Rukhin:TestPRNG:NIST}
82: A.~Rukhin, et~al., A statistical test suite for random and pseudorandom number
83:   generators for cryptographic applications, NIST Special Publication 800-22,
84:   available online at
85:   \url{http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html}
86:   (2001).
87: 
88: \end{thebibliography}
89: