[1] 盛苏英,吴新华.基于耦合映象格子的混沌图像加密算法研究[J].微电子学与计算机,2014(1):32.
[2] Kinzel W,Englert A,Kanter I.On chaos synchronization and secure communication[J].Phil Trans R Soc(A),2010,368(1911):379.
[3] Olivares F,Plastino A,Rosso O A,Contrasting chaos with noise via local versus global information quantiers[J].Phys Lett(A),2012,376:1577.
[4] Kocarev L,Lian S G.Chaos-based Cryptography:Theory,Algorithms and Applications[M].Berlin:Springer,2011.
[5] Lozi R.Emergence of randomness from chaos[J].International Journal of Bifurcation and Chaos,2012,22(2):15.
[6] Pareek N K,Patidar V,Sud K K.A random bit generator using chaotic maps[J].International Journal of Network Security,2010,10(1):32.
[7] Wang K,Pei W J,Zou L H,et al.The asymptotic deterministic randomness[J].Phys Lett(A),2007,368:38.
[8] Kaneko K.Period-doubling of kink-antikink patterns,quasiperiodicity in antiferro-like structures and spatial intermittency in coupled logistic lattice[J].Progress of Theoretical Physics,1984,72(3):480.
[9] Wang K,Pei W J,Xia H S,et al.Pseudo-random number generator based on asymptotic deterministic randomness[J].Phys Lett(A),2008,372:4388.
[10] Wang K,Pei W J,Gonzalez J A,et al.Statistical independence in nonlinear maps coupled to non-invertible transformations[J].Phys Lett(A),2008,372:6593.
[11] Wang K,Pei W J,Hou X B,et al.Discrete asymptotic deterministic randomness for the generation of pseudorandom bits[J].Phys Lett(A),2009,373:653.