[1] Frey D. R.: Chaotic digital encoding: An approach to secure communication. IEEE Trans. Circuits and Systems 40 (1993), 10, 660–666
[2] Jin, Ch.: The analysis of a block cipher algorithm based on chaos (in Chinese). China Engnrg. Sci. 3 (2001), 6, 1066–1070
[3] Jin, Ch., Gao H.: Analysis of two stream ciphers based on chaos (in Chinese). Acta Electronic Sinica 34 (2004), 7, 1066–1070
[4] Li S., Mou X., Ji, Z., Zhang J.: Cryptanalysis of a class of chaotic stream ciphers (in Chinese). J. Electronics & Information Technology 25 (2003), 4, 473–479
[5] Matsui M.:
Linear cryptanalysis method for DES cipher. In: Advance in Cryptology - Eurocrypt’93 (Lecture Notes in Control Systems 765.) Springer-Verlag, Berlin 1994
Zbl 0951.94519
[6] Zhou H., Ling X.-T.: Problems with the chaotic inverse systems encryption approach. IEEE Trans. Circuits and Systems-I 44 (1997), 3, 268–271
[7] Zhou H., Luo, J., Ling X.: Generating nonlinear feedback stream ciphers via chaotic systems (in Chinese). Acta Electronic Sinica 25 (1997), 10, 57–60
[8] Zhou H., Yu, J., Ling X.: Theoretical design of chaotic feed forward stream cipher (in Chinese). Acta Electronic Sinica 26 (1998), 1, 98–101