[1] FEYNMAN R P.There's plenty of room at the bottom[J].Resonance,2011,16(9):890.
[2] ADLEMAN L M.Molecular computation of solution to combinational problems[J].Science,1994, 266(5187):1021.
[3] CLELLAND C T,RISCA V,BANCROFT C.Hiding messages in DNA microdots[J].Nature,1999,399(6736):533.
[4] COX J P L.Long-term data storage in DNA[J].TRENDS in biotechnology,2001,19(7):247.
[5] 肖国镇,卢明欣,秦磊,等.密码学的新领域——DNA密码[J].科学通报,2006,51(10):1139.
[6] GEHANI A,LABEAN T,REIF J.DNA-based cryptog-raphy[C]//Aspects of Molecular Computing,Heidel-berg:Springer,2004:167.
[7] LEIER A,RICHTER C,BANZHAF W,et al.Cryptogra-phy with DNA binary strands[J].Biosystems,2000,57(1):13.
[8] CHEN J.A DNA-based biomolecular cryptography de-sign[C]//Proceedings of the 2003 International Sympo-sium on Circuits and Systems,Piscataway:IEEE,2003:822.
[9] 饶妮妮.一种基于重组DNA技术的密码方案[J].电子学报,2004,32(7):1216.
[10] ZHANG X C,NIU Y,GUI G Z,et al.Breaking the NTRU public-key cryptosystem using self-assembly of DNA tilings[J].Chinese journal of computers,2008,31(12):2129.
[11] 崔光照,秦利敏,王延峰,等.基于DNA技术的加密方案[J].计算机工程与应用,2009,45(8):104.
[12] GOFF G C L,BLUM L J,MARQUETTE C A.Shrinking hydrogel-DNA spots generates 3D microdots arrays[J].Macromolecular bioscience, 2013, 13(2):227.
[13] 王延峰,韩琴琴,韩栋,等.基于核酸的信息安全技术研究现状及发展建议[J].中国科学院院刊,2014,29(1):83.
[14] 崔光照,秦利敏,王延峰,等.DNA 计算中的信息安全技术[J].计算机工程与应用,2007,43(20):139.
[15] 张勋才,韩琴琴,王燕,等.一种基于RNA二级结构的信息隐藏方案[J].郑州轻工业学院学报(自然科学版),2014,29(1):1.
[16]
[17] 卢明欣,傅晓彤,秦磊,等.DNA信息隐藏方法的安全性分析和保密增强方法[J].西安电子科技大学学报(自然科学版),2006,33(3):448.
[18] 薛香莲.基于DNA 序列与多混沌映射的数字图像加密技术研究[D].大连:大连大学,2010.
[19] 徐光宪,郭晓娟.基于混沌系统的DNA图像加密算法[J].计算机应用,2014,34(11):3177.
[20] 张健,房东鑫.应用混沌映射索引和DNA编码的图像加密技术[J].计算机工程与设计,2015,36(3):614.
[21] SUN J W,YIN Q,SHEN Y.Compound synchronization for four chaotic systems of integer order and fractional order[J].EPL(europhysics letters),2014,106(4):40005.
[22] SUN J,CUI G,WANG Y,et al.Combination complex synchronization of three chaotic complex systems[J].Nonlinear dynamics,2014,79(2):953.
[23] WEI Q,WANG X Y,HU X P.Inverse optimal control for permanent magnet synchronous motor[J].Journal of vibration and control,2015,21(4):801.
[24] SUN J W,SHEN Y,YIN Q,et al.Compound synchroni-zation of four memristor chaotic oscillator systems and secure communication[J].Chaos,2013,23(1):013140.
[25] NAOR M,SHAMIR A.Visual cryptography[C]//Ad-vances in Cryptology-EUROCRYPT'94,Berlin:Springer,1995:1-12.
[26] ZHANG X C,WANG Y,SHEN C N,et al.An image encryption algorithm based on DNA microarray[J].Journal of computational and theoretical nanoscience,2015,doi:10.1166/jctn.2015.4553.
[27] 肖国镇,卢明欣.DNA计算与DNA密码[J].工程数学学报,2006,23(1):1.
[28] HEIDER D,BARNEKOW A.DNA-based watermarks using the DNA-crypt algorithm[J].BMC bioinformatics,2007(8):176.
[29] 石晓龙,许进.DNA计算与背包问题[J].计算机工程与应用,2004,39(27):44.
[30] DAREHMIRAKI M,NEHI H M.Molecular solution to the 0-1 knap-sack problem based on DNA computing[J].Applied mathematics and computation,2007,187(2):1033.
[31] PELLETIER O,WEIMERSKIRCH A.Algorithmic self-assembly of DNA tiles and its application to cryptanalysis[C]//Proceedings of the Genetic and Evolutionary Computation Conference,N.Y.USA:Morgan Kaufmann,2002:139-146.
[32] MILLER V. Use of elliptic curves in cryptography[J].Lecture notes in computer science,1985,85: 417.
[33] LI K L,ZOU S T,XV J.Fast parallel molecular algo-rithms for DNA-based computation:solving the elliptic curve discrete logarithm problem over GF(2n)[J].Journal of biomedicine and bio-technology,2008,2008:1.
[34] CHENG Z.Arithmetic computation of multiplicative invesion and division in GF(2<em>n)using self-assembly of DNA tiles[J].Journal of computational and theoretical nanoscience,2012,9(3):336.
[35] CHENG Z.Nondeterministic algorithm for breaking diffie hell-man key exchange using self-assembly of DNA tiles[J].International journal of computers,communication and control,2012,7(4):616.
[36] 陈智华,石晓龙,程珍.DNA计算在信息安全领域的影响与应用[J].中国科学院院刊,2014,29(1):70.