期刊文献+
共找到512篇文章
< 1 2 26 >
每页显示 20 50 100
A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations 被引量:4
1
作者 张立民 孙克辉 +1 位作者 刘文浩 贺少波 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第10期98-106,共9页
In this paper, Adomian decomposition method (ADM) with high accuracy and fast convergence is introduced to solve the fractional-order piecewise-linear (PWL) hyperchaotic system. Based on the obtained hyperchaotic ... In this paper, Adomian decomposition method (ADM) with high accuracy and fast convergence is introduced to solve the fractional-order piecewise-linear (PWL) hyperchaotic system. Based on the obtained hyperchaotic sequences, a novel color image encryption algorithm is proposed by employing a hybrid model of bidirectional circular permutation and DNA masking. In this scheme, the pixel positions of image are scrambled by circular permutation, and the pixel values are substituted by DNA sequence operations. In the DNA sequence operations, addition and substraction operations are performed according to traditional addition and subtraction in the binary, and two rounds of addition rules are used to encrypt the pixel values. The simulation results and security analysis show that the hyperchaotic map is suitable for image encryption, and the proposed encryption algorithm has good encryption effect and strong key sensitivity. It can resist brute-force attack, statistical attack, differential attack, known-plaintext, and chosen-plaintext attacks. 展开更多
关键词 color image encryption DNA sequence operation fractional calculus piecewise-linear hyperchaotic system
原文传递
Image Encryption Application of Chaotic Sequences Incorporating Quantum Keys 被引量:3
2
作者 Bin Ge Hai-Bo Luo 《International Journal of Automation and computing》 EI CSCD 2020年第1期123-138,共16页
This paper proposes an image encryption algorithm LQBPNN(logistic quantum and back propagation neural network)based on chaotic sequences incorporating quantum keys. Firstly, the improved one-dimensional logistic cha... This paper proposes an image encryption algorithm LQBPNN(logistic quantum and back propagation neural network)based on chaotic sequences incorporating quantum keys. Firstly, the improved one-dimensional logistic chaotic sequence is used as the basic key sequence. After the quantum key is introduced, the quantum key is incorporated into the chaotic sequence by nonlinear operation. Then the pixel confused process is completed by the neural network. Finally, two sets of different mixed secret key sequences are used to perform two rounds of diffusion encryption on the confusing image. The experimental results show that the randomness and uniformity of the key sequence are effectively enhanced. The algorithm has a secret key space greater than 2182. The adjacent pixel correlation of the encrypted image is close to 0, and the information entropy is close to 8. The ciphertext image can resist several common attacks such as typical attacks, statistical analysis attacks and differential attacks. 展开更多
关键词 Logistic chaotic system quantum key nonlinear operation sequence performance image encryption algorithm
原文传递
A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE 被引量:2
3
作者 Jiang Zhengtao Hao Yanhua Wang Yumin 《Journal of Electronics(China)》 2005年第5期490-497,共8页
Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is ... Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is equivalent to partial LUC discrete logarithm problem in ZN, and for the proposed probabilistic encryption scheme, its semantic security is equivalent to decisional LUC Diffie-Hellman problem in ZN. At last, the efficiency of the proposed schemes is briefly analyzed. 展开更多
关键词 Probabilistic public-key encryption scheme LUCas sequence(LUC) Discrete logarithm Integer factorization
在线阅读 下载PDF
Length matters:Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning 被引量:4
4
作者 Zihan Chen Guang Cheng +3 位作者 Ziheng Xu Shuyi Guo Yuyang Zhou Yuyu Zhao 《Digital Communications and Networks》 SCIE CSCD 2022年第3期289-302,共14页
As an essential function of encrypted Internet traffic analysis,encrypted traffic service classification can support both coarse-grained network service traffic management and security supervision.However,the traditio... As an essential function of encrypted Internet traffic analysis,encrypted traffic service classification can support both coarse-grained network service traffic management and security supervision.However,the traditional plaintext-based Deep Packet Inspection(DPI)method cannot be applied to such a classification.Moreover,machine learning-based existing methods encounter two problems during feature selection:complex feature overcost processing and Transport Layer Security(TLS)version discrepancy.In this paper,we consider differences between encryption network protocol stacks and propose a composite deep learning-based method in multiprotocol environments using a sliding multiple Protocol Data Unit(multiPDU)length sequence as features by fully utilizing the Markov property in a multiPDU length sequence and maintaining suitability with a TLS-1.3 environment.Control experiments show that both Length-Sensitive(LS)composite deep learning model using a capsule neural network and LS-long short time memory achieve satisfactory effectiveness in F1-score and performance.Owing to faster feature extraction,our method is suitable for actual network environments and superior to state-of-the-art methods. 展开更多
关键词 encrypted internet traffic encrypted traffic service classification Multi PDU length sequence Length sensitive composite deep learning TLS-1.3
在线阅读 下载PDF
Pseudo-Random Sequences Generator Based on Discrete Hyperchaotic Systems 被引量:1
5
作者 Li Changgang & Han Zhengzhi Department of Automation, Shanghai Jiaotong University, Shanghai 200030, P. R. China 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2003年第4期84-89,共6页
We first design a discrete hyperchaotic system via piece-wise linear state feedback. The states of the closed loop system are locally expanding in two directions but absolutely bounded on the whole, which implies hype... We first design a discrete hyperchaotic system via piece-wise linear state feedback. The states of the closed loop system are locally expanding in two directions but absolutely bounded on the whole, which implies hyperchaos. Then, we use three suchlike hyperchaotic systems with different feedback gain matrices to design a pseudo-random sequence generator (PRSG). Through a threshold function, three sub-sequences generated from the output of piecewise linear functions are changed into 0-1 sequences. Then, followed by XOR operation, an unpredictable pseudo-random sequence (PRS) is ultimately obtained. The analysis and simulation results indicate that the PRS, generated with hyperchaotic systems, has desirable statistical features. 展开更多
关键词 discrete hyperchaotic system piecewise linear state feedback pseudo-random sequences.
在线阅读 下载PDF
Chaos-Based Novel Watermarked Satellite Image Encryption Scheme
6
作者 Mohamed Medani Yahia Said +4 位作者 Nashwan Adnan Othman Farrukh Yuldashev Mohamed Kchaou Faisal Khaled Aldawood Bacha Rehman 《Computer Modeling in Engineering & Sciences》 2025年第4期1049-1070,共22页
Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of threats.To ensure the security and privacy of these images,theymust be watermarked and encrypted be... Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of threats.To ensure the security and privacy of these images,theymust be watermarked and encrypted before communication.Therefore,this paper proposes a novel watermarked satellite image encryption scheme based on chaos,Deoxyribonucleic Acid(DNA)sequence,and hash algorithm.The watermark image,DNA sequence,and plaintext image are passed through the Secure Hash Algorithm(SHA-512)to compute the initial condition(keys)for the Tangent-Delay Ellipse Reflecting Cavity Map(TD-ERCS),Henon,and Duffing chaotic maps,respectively.Through bitwise XOR and substitution,the TD-ERCS map encrypts the watermark image.The ciphered watermark image is embedded in the plaintext image.The embedded plaintext image is permuted row-wise and column-wise using the Henon chaotic map.The permuted image is then bitwise XORed with the values obtained from the Duffing map.For additional security,the XORed image is substituted through a dynamic S-Box.To evaluate the efficiency and performance of the proposed algorithm,several tests are performed which prove its resistance to various types of attacks such as brute-force and statistical attacks. 展开更多
关键词 DNA sequence TD-ERCS chaoticmap henon chaoticmap duffing chaotic system SHA-512 encryption technique watermark embedding
在线阅读 下载PDF
HIERACHICAL STRUCTURES FOR GENERATING PSEUDO-RANDOM SEQUENCES AND ARRAYS
7
作者 Shi Wenhong Chen Jinguang(Department of Radio Engineering, Fuzhou University, Fuzhou 350002) 《Journal of Electronics(China)》 1997年第1期20-26,共7页
This paper proposes new hierarchical structures for generating pseudorandom sequences and arrays. The principle of the structures is based on a new concept-multi-interleaving. It is the generalization of normal sequen... This paper proposes new hierarchical structures for generating pseudorandom sequences and arrays. The principle of the structures is based on a new concept-multi-interleaving. It is the generalization of normal sequence decimation(sampling). The kernal of the structures is a lower speed linear feedback shift register together with several high speed time-division multiplexers arranged hierarchically. These new structures have much higher speed compared with that of other schemes proposed before. 展开更多
关键词 pseudo-random sequenceS pseudo-random ARRAYS High-speed generation sequence DECIMATION
在线阅读 下载PDF
Efficient Security Sequencing Problem over Insecure Channel Based on Homomorphic Encryption
8
作者 Mingxu Yi Lifeng Wang Yunpeng Ma 《China Communications》 SCIE CSCD 2016年第9期195-202,共8页
In the field of sequencing of secret number,an important problem is how to establish an efficient and secure protocol for sorting the secret number.As a powerful tool in solving privacy sequencing problems,secure mult... In the field of sequencing of secret number,an important problem is how to establish an efficient and secure protocol for sorting the secret number.As a powerful tool in solving privacy sequencing problems,secure multipart computation is more and more popular in anonymous voting and online auction.In the present study,related secure computation protocol for sequencing problem is not many by far.In order to improve the efficiency and safety,we propose a security sequencing protocol based on homomorphic encryption.We also give analysis of correctness and security to highlight its feasibility. 展开更多
关键词 homomorphic encryption privacy sequencing problem secure multipart compu- tation information transformation
在线阅读 下载PDF
Adding Pseudo-Random Test Sequence Generator in the Test Simulator for DFT Approach
9
作者 Afaq Ahmad Dawood Al-Abri Sayyid Samir AI-Busaidi 《Computer Technology and Application》 2012年第7期463-470,共8页
This paper presents modified version of a realistic test tool suitable to Design For Testability (DFT) and Built-ln Self Test (BIST) environments. A comprehensive tool is developed in the form of a test simulator.... This paper presents modified version of a realistic test tool suitable to Design For Testability (DFT) and Built-ln Self Test (BIST) environments. A comprehensive tool is developed in the form of a test simulator. The simulator is capable of providing a required goal of test for the Circuit Under Test (CUT). The simulator uses the approach of fault diagnostics with fault grading procedures to provide the optimum tests. The current version of the simulator embeds features of exhaustive and pseudo-random test generation schemes along with the search solutions of cost effective test goals. The simulator provides facilities of realizing all possible pseudo-random sequence generators with all possible combinations of seeds. The tool is developed on a common Personal Computer (PC) platform and hence no special software is required. Thereby, it is a low cost tool hence economical. The tool is very much suitable for determining realistic test sequences for a targeted goal of testing for any CUT. The developed tool incorporates flexible Graphical User Interface (GUI) procedures and can be operated without any special programming skill. The tool is debugged and tested with the results of many bench mark circuits. Further, this developed tool can be utilized for educational purposes for many courses such as fault-tolerant computing, fault diagnosis, digital electronics, and safe-reliable-testable digital logic designs. 展开更多
关键词 Digital system testing built-in self test design for testability test vector pseudo-random test sequence linear feedbackshift registers fault diagnosis fault collapsing realistic test fault cover iteration.
在线阅读 下载PDF
New chaotical image encryption algorithm based on Fisher–Yatess scrambling and DNA coding 被引量:10
10
作者 Xing-Yuan Wang Jun-Jian Zhang +1 位作者 Fu-Chen Zhang Guang-Hui Cao 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第4期121-130,共10页
Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used ... Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used as the initial value of the chaotic system. Second, the chaotic sequence and Fisher–Yatess scrambling are used to scramble the plaintext,and a sorting scrambling algorithm is used for secondary scrambling. Then, the chaotic sequence and DNA coding rules are used to change the plaintext pixel values, which makes the ciphertext more random and resistant to attacks, and thus ensures that the encrypted ciphertext is more secure. Finally, we add plaintext statistics for pixel-level diffusion to ensure plaintext sensitivity. The experimental results and security analysis show that the new algorithm has a good encryption effect and speed, and can also resist common attacks. 展开更多
关键词 Fisher–Yatess SCRAMBLING CHAOTIC sequence DNA CODING image encryption
原文传递
PERFECT PUNCTURED BINARY SEQUENCE PAIRS 被引量:15
11
作者 JiangTing ZhaoXiaoqun HouLantian 《Journal of Electronics(China)》 2003年第4期285-288,共4页
This paper presents the definition of perfect punctured binary sequence pair and the combinatorial admissible conditions for searching the perfect punctured binary sequence pairs and proves that all of the pseudo-rand... This paper presents the definition of perfect punctured binary sequence pair and the combinatorial admissible conditions for searching the perfect punctured binary sequence pairs and proves that all of the pseudo-random binary sequences satisfy these conditions. Computer calculation verifies that the pseudo-random binary sequences with length up to N=127 can be easily turned into perfect punctured binary sequence pairs. 展开更多
关键词 Information theory Perfect sequences CODES pseudo-random binary sequence
在线阅读 下载PDF
An image encryption algorithm based on improved baker transformation and chaotic S-box 被引量:4
12
作者 Xing-Yuan Wang Huai-Huai Sun Hao Gao 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第6期216-225,共10页
The algorithm is an image encryption algorithm based on the improved baker transformation and chaotic substitution box(S-box). It mainly uses the initial values and parameters of a one-dimensional logistic chaotic sys... The algorithm is an image encryption algorithm based on the improved baker transformation and chaotic substitution box(S-box). It mainly uses the initial values and parameters of a one-dimensional logistic chaotic system as an encryption key. Specifically, in the image scrambling stage, the algorithm primarily uses an improved baker transform method to process the image. In the image diffusion stage, the algorithm first uses the chaotic S-box method to process the encryption key. Secondly, an exclusive OR(XOR) operation is performed on the image and the encryption key to initially diffuse the image. Finally, the image is again diffused using the method of ortho XOR. Simulation analysis shows that the algorithm can achieve good encryption effect, simple and easy implementation, and good security. In the digital image communication transmission, it has good practical value. 展开更多
关键词 image encryption improved baker transformation chaotic S-box chaotic sequence
原文传递
Novel Frequency Hopping Sequences Generator Based on AES Algorithm 被引量:2
13
作者 李振荣 庄奕琪 +1 位作者 张博 张超 《Transactions of Tianjin University》 EI CAS 2010年第1期22-27,共6页
A novel frequency hopping(FH) sequences generator based on advanced encryption standard(AES) iterated block cipher is proposed for FH communication systems.The analysis shows that the FH sequences based on AES algorit... A novel frequency hopping(FH) sequences generator based on advanced encryption standard(AES) iterated block cipher is proposed for FH communication systems.The analysis shows that the FH sequences based on AES algorithm have good performance in uniformity, correlation, complexity and security.A high-speed, low-power and low-cost ASIC of FH sequences generator is implemented by optimizing the structure of S-Box and MixColumns of AES algorithm, proposing a hierarchical power management strategy, and applying ... 展开更多
关键词 frequency hopping sequences advanced encryption standard LOW-POWER LOW-COST application specific integrated circuit
在线阅读 下载PDF
Adaptive and Dynamic Mobile Phone Data Encryption Method 被引量:1
14
作者 CAO Wanpeng BI Wei 《China Communications》 SCIE CSCD 2014年第1期103-109,共7页
To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm... To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm is not static and uniform.For each encryption,this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system.From the mobile phone's character,the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information,personalization information and a pseudo-random number.Secondly,the data is rearranged with a randomly selected start position in the data before being encrypted.The start position's randomness makes the mobile phone data encryption safer.Thirdly,the rearranged data is encrypted by the selected algorithm and generated key.Finally,the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process. 展开更多
关键词 data encryption mobile phone cloud storage pseudo-random number
在线阅读 下载PDF
Design of a New Chaos Circuit and Its Encryption to Digital Information 被引量:3
15
作者 王宏 彭建华 周正欧 《Journal of Electronic Science and Technology of China》 2004年第4期25-28,共4页
A new hyperchaos circuit system with simple structure is designed in this paper. It can be implemented with changeable dimensions 3, 5, 7, 9, etc, therefore it can afford different security grades for applications. Th... A new hyperchaos circuit system with simple structure is designed in this paper. It can be implemented with changeable dimensions 3, 5, 7, 9, etc, therefore it can afford different security grades for applications. The dynamic characters of the 7th order circuit have been analyzed as an example. Using the hyperchaos time sequence produced by this circuit as key sequence, the encryption and decryption to digital signals of text and image files have been realized, and the real-time ability has been increased with encrypting digital signals per byte. 展开更多
关键词 HYPERCHAOS dynamic character key sequence encryption
在线阅读 下载PDF
Variant Map System to Simulate Complex Properties of DNA Interactions Using Binary Sequences 被引量:1
16
作者 Jeffrey Zheng Weiqiong Zhang +2 位作者 Jin Luo Wei Zhou Ruoyu Shen 《Advances in Pure Mathematics》 2013年第7期5-24,共20页
Stream cipher, DNA cryptography and DNA analysis are the most important R&D fields in both Cryptography and Bioinformatics. HC-256 is an emerged scheme as the new generation of stream ciphers for advanced network ... Stream cipher, DNA cryptography and DNA analysis are the most important R&D fields in both Cryptography and Bioinformatics. HC-256 is an emerged scheme as the new generation of stream ciphers for advanced network security. From a random sequencing viewpoint, both sequences of HC-256 and real DNA data may have intrinsic pseudo-random properties respectively. In a recent decade, many DNA sequencing projects are developed on cells, plants and animals over the world into huge DNA databases. Researchers notice that mammalian genomes encode thousands of large noncoding RNAs (lncRNAs), interact with chromatin regulatory complexes, and are thought to play a role in localizing these complexes to target loci across the genome. It is a challenge target using higher dimensional visualization tools to organize various complex interactive properties as visual maps. The Variant Map System (VMS) as an emerging scheme is systematically proposed in this paper to apply multiple maps that used four Meta symbols as same as DNA or RNA representations. System architecture of key components and core mechanism on the VMS are described. Key modules, equations and their I/O parameters are discussed. Applying the VM System, two sets of real DNA sequences from both sample human (noncoding DNA) and corn (coding DNA) genomes are collected in comparison with pseudo DNA sequences generated by HC-256 to show their intrinsic properties in higher levels of similar relationships among relevant DNA sequences on 2D maps. Sample 2D maps are listed and their characteristics are illustrated under controllable environment. Visual results are briefly analyzed to explore their intrinsic properties on selected genome sequences. 展开更多
关键词 pseudo-random Number Generator STREAM CIPHER HC-256 Binary to DNA Pseudo DNA sequence Large Noncoding DNA Analysis 2D MAP Visual Distribution VARIANT MAP System
暂未订购
Autocorrelation of Sequences Generated by Single Cycle T-Functions
17
作者 王艳 胡予濮 +1 位作者 李顺波 杨旸 《China Communications》 SCIE CSCD 2011年第5期144-150,共7页
Cryptographic properties of the single cycle T-function's output sequences are investigated.Bounds of autocorrelation functions of the kth coordinate sequence and bounds of state output sequence are calculated res... Cryptographic properties of the single cycle T-function's output sequences are investigated.Bounds of autocorrelation functions of the kth coordinate sequence and bounds of state output sequence are calculated respectively.The Maximum Sidelobe Ratio(MSR) of the kth coordinate sequence and the MSR of state output sequence are given respectively.The bounds of autocorrelation functions show that the values of autocorrelation functions are large when shifts are small.Comparisons of the autocorrelations between the state output sequence and coordinate output sequence are illustrated.The autocorrelation properties demonstrate that T-functions have cryptographic weaknesses and the illustration result shows coordinate output sequences have better autocorrelation than that of state output sequences. 展开更多
关键词 CRYPTOGRAPHY pseudo-random sequences AUTOCORRELATION single cycle T-function
在线阅读 下载PDF
Binary Sequences from a Pair of Elliptic Curves
18
作者 CHEN Zhixiong ZHANG Ning XIAO Guozhen 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1511-1515,共5页
A family of binary sequences were constructed by using an elliptic curve and its twisted curves over finite fields. It was shown that these sequences possess "good" cryptographie properties of 0-1 distribution, long... A family of binary sequences were constructed by using an elliptic curve and its twisted curves over finite fields. It was shown that these sequences possess "good" cryptographie properties of 0-1 distribution, long period and large linear complexity. The results indicate that such se quences provide strong potential applications in cryptography. 展开更多
关键词 pseudo-random sequences elliptic curves stream ciphers elliptic curve cryptography
在线阅读 下载PDF
FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient
19
作者 Fei Yu Zinan Zhang +3 位作者 Hui Shen Yuanyuan Huang Shuo Cai Sichun Du 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第2期109-118,共10页
A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and d... A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and dynamically analyzed,and implemented on FPGA.Then,a new pseudo-random number generator(PRNG)based on MHNN is proposed.The post-processing unit of the PRNG is composed of nonlinear post-processor and XOR calculator,which effectively ensures the randomness of PRNG.The experiments in this paper comply with the IEEE 754-1985 high precision32-bit floating point standard and are done on the Vivado design tool using a Xilinx XC7 Z020 CLG400-2 FPGA chip and the Verilog-HDL hardware programming language.The random sequence generated by the PRNG proposed in this paper has passed the NIST SP800-22 test suite and security analysis,proving its randomness and high performance.Finally,an image encryption system based on PRNG is proposed and implemented on FPGA,which proves the value of the image encryption system in the field of data encryption connected to the Internet of Things(Io T). 展开更多
关键词 memristive Hopfield neural network(MHNN) pseudo-random number generator(PRNG) FPGA image encryption decryption system
原文传递
Image Encryption and Decryption Based on Chaotic Algorithm
20
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos Algorithm Image encryption and Decryption Two-Stage Logistic Mapping M sequence
在线阅读 下载PDF
上一页 1 2 26 下一页 到第
使用帮助 返回顶部