[1] 王延峰,韩琴琴,韩栋,等.基于核酸的信息安全技术研究现状及发展建议[J].中国科学院院刊,2014,29(1):83.
[2] WANG X Y,YU H B.How to break MD5 and other hash functions[J].Lectrue notes in computer science,2005,3494:19.
[3] WANG X Y,YIN Y Q L,YU H B.Finding collisions in the full SHA-1[J].Lectrue notes in computer science,2005,3621:17.
[4] NAOR M,SHAMIR A.Visual cryptography[J].Lectrue notes in computer science,1995,950:1.
[5] EKERT A K.Quantum cryptography based on Bell's theorem[J].Physical review letters,1991,67(6):661.
[6] 肖国镇,卢明欣,秦磊,等.密码学的新领域——DNA密码[J].科学通报,2006,51(10):1139.
[7] ADLEMAN L M.Molecular computation of solutions to combinatorial problems[J].Science,1994,266(5187):1021.
[8] BONEH D,DUNWORTH C,LIPTON R J.Breaking DES using a molecular computer[J].DNA based computers,1996,27:37.
[9] CELLAND C T,RISCA V,BANCROFT C.Hiding messages in DNA microdots[J].Nature,1999,399(6736):533.
[10] SHIMANOVSKY B,FENG J,POTKONJAK M.Hidingdata in DNA[C].Lectrue notes in computer science,2003,2578:373.
[11] GEHANI A,LABEAN T,REIF J.DNA-based cryptography[J].Lectrue notes in computer science,2004,2950:167.
[12] TANAKA K,OKAMOTO A,SAITO I.Public-key system using DNA as a one-way function for key distribution[J].Biosystems,2005,81(1):25.
[13] 崔光照,秦利敏,王延峰,等.基于DNA技术的加密方案[J].计算机工程与应用,2009,45(8):104.
[14] SHIU H J,NG K L,FANG J F,et al.Data hiding methods based upon DNA sequences[J].Information of science,2010,180(11):2196.
[15] GUO C,CHANG C C,WANG Z H.A new data hiding scheme based on DNA sequence[J].International journal of innovative computing information & control,2012,8(1):1.
[16] GOFF G C L,BLUM L J,MARQUETTE C A.Shrinking hydrogel-DNA spots generates 3D microdots arrays[J].Macromolecular bioscience,2013,13(2):227.
[17] 张勋才,韩琴琴,王燕,等.一种基于RNA二级结构的信息隐藏方案[J].郑州轻工业学院学报(自然科学版),2014,29(1):1.
[18] FANG XW,LAI XJ.DNA-chip-based information hiding scheme[J].Communications in computer and information science,2014,472:123.
[19] 饶妮妮.一种基于重组DNA技术的密码方案[J].电子学报,2004,32(7):1216.
[20] 陈惟昌,陈志华.遗传密码和DNA序列的高维空间数字编码[J].生物物理学报,2000,16(4):760.
[21] AMOS M,PAUN G,ROZENBERG G,et al.Topics in the theory of DNA computing[J].Theoretical computer science,2002,287(1):3.