1 % This file was created with JabRef 2.7.
4 @INPROCEEDINGS{AdelsbachKS06,
5 author = {Andr{\'e} Adelsbach and Stefan Katzenbeisser and Ahmad-Reza Sadeghi},
6 title = {A Computational Model for Watermark Robustness},
7 booktitle = {Information Hiding},
10 bibsource = {DBLP, http://dblp.uni-trier.de},
11 crossref = {DBLP:conf/ih/2006},
12 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_10},
14 timestamp = {2009.06.29}
18 title = {Seminumerical Algorithms},
19 publisher = {Addison-Wesley, Reading, MA, USA},
21 author = {D. E. Knuth},
23 edition = {Third Edition},
25 timestamp = {2012.02.15}
32 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
35 author = {Guyeux, Christophe},
36 title = {Le d\'esordre des it\'erations chaotiques - Applications aux r\'eseaux de capteurs, \`a la dissimulation d'information, et aux fonctions de hachage},
37 abstract = {Les itérations chaotiques, un outil issu des mathématiques discrètes, sont pour la première fois étudiées pour obtenir de la divergence et du désordre. Après avoir utilisé les mathématiques discrètes pour en déduire des situations de non convergence, ces itérations sont modélisées sous la forme d'un système dynamique et sont étudiées topologiquement dans le cadre de la théorie mathématique du chaos. Nous prouvons que leur adjectif « chaotique » a été bien choisi : ces itérations sont du chaos aux sens de Devaney, Li-Yorke, l'expansivité, l'entropie topologique et l'exposant de Lyapunov, etc. Ces propriétés ayant été établies pour une topologie autre que la topologie de l'ordre, les conséquences de ce choix sont discutées. Nous montrons alors que ces itérations chaotiques peuvent être portées telles quelles sur ordinateur, sans perte de propriétés, et qu'il est possible de contourner le problème de la finitude des ordinateurs pour obtenir des programmes aux comportements prouvés chaotiques selon Devaney, etc. Cette manière de faire est respectée pour générer des algorithmes de tatouage numérique et des fonction de hachage chaotiques au sens le plus fort qui soit.},
38 publisher = {\'Editions Universitaires Europ\'eennes},
39 isbn = {978-3-8417-9417-8},
41 note = {ISBN 978-3-8417-9417-8. 362 pages. Publication de la thèse de doctorat.},
44 @inproceedings{bfg12a:ip,
46 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
49 author = {Bahi, Jacques and Fang, Xiaole and Guyeux, Christophe},
50 title = {An optimization technique on pseudorandom generators based on chaotic iterations},
51 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
53 address = {Venice, Italy},
60 @UNPUBLISHED{ANDREW2008,
61 author = {NIST Special Publication 800-22 rev. 1},
62 title = {A Statistical Test Suite for Random and Pseudorandom Number Generators
63 for Cryptographic Applications},
66 timestamp = {2009.01.22}
69 @Article{combined_lcg,
70 title = "Efficient and portable combined random number generators",
72 journal = "Communications of the ACM",
80 @INPROCEEDINGS{Fischlin,
81 author = {Fischlin, R. and Schnorr, C. P.},
82 title = {Stronger security proofs for RSA and rabin bits},
83 booktitle = {Proceedings of the 16th annual international conference on Theory
84 and application of cryptographic techniques},
86 series = {EUROCRYPT'97},
88 address = {Berlin, Heidelberg},
89 publisher = {Springer-Verlag},
91 isbn = {3-540-62975-0},
92 location = {Konstanz, Germany},
94 url = {http://dl.acm.org/citation.cfm?id=1754542.1754569}
97 @INPROCEEDINGS{BattiatoCGG99,
98 author = {Sebastiano Battiato and Dario Catalano and Giovanni Gallo and Rosario
100 title = {Robust Watermarking for Images Based on Color Manipulation},
101 booktitle = {Information Hiding},
104 bibsource = {DBLP, http://dblp.uni-trier.de},
105 crossref = {DBLP:conf/ih/1999},
107 timestamp = {2009.06.29}
110 @INPROCEEDINGS{ComesanaPP05,
111 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
112 title = {The Return of the Sensitivity Attack},
116 bibsource = {DBLP, http://dblp.uni-trier.de},
117 crossref = {DBLP:conf/iwdw/2005},
118 ee = {http://dx.doi.org/10.1007/11551492_20},
120 timestamp = {2009.06.29}
123 @INPROCEEDINGS{ComesanaPP05bis,
124 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
125 title = {Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum
127 booktitle = {IH'05: Information Hiding Workshop},
130 publisher = {Lectures Notes in Computer Science, Springer-Verlag},
131 bibsource = {DBLP, http://dblp.uni-trier.de},
132 crossref = {DBLP:conf/ih/2005},
133 ee = {http://dx.doi.org/10.1007/11558859_12},
135 timestamp = {2009.06.30}
138 @INPROCEEDINGS{CongJQZ06,
139 author = {Jin Cong and Yan Jiang and Zhiguo Qu and Zhongmei Zhang},
140 title = {A Wavelet Packets Watermarking Algorithm Based on Chaos Encryption},
141 booktitle = {ICCSA (1)},
144 bibsource = {DBLP, http://dblp.uni-trier.de},
145 crossref = {DBLP:conf/iccsa/2006-1},
146 ee = {http://dx.doi.org/10.1007/11751540_100}
149 @INPROCEEDINGS{DBLP:conf/focs/DziembowskiP08,
150 author = {Stefan Dziembowski and Krzysztof Pietrzak},
151 title = {Leakage-Resilient Cryptography},
155 bibsource = {DBLP, http://dblp.uni-trier.de},
156 crossref = {DBLP:conf/focs/2008},
157 ee = {http://dx.doi.org/10.1109/FOCS.2008.56}
160 @INCOLLECTION{Filiol10,
161 author = {Eric Filiol},
162 title = {Viruses and Malware},
163 booktitle = {Handbook of Information and Communication Security},
166 bibsource = {DBLP, http://dblp.uni-trier.de},
167 crossref = {DBLP:reference/icsec/2010},
168 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4_34}
171 @INPROCEEDINGS{Filiol00,
172 author = {Eric Filiol},
173 title = {Decimation Attack of Stream Ciphers},
174 booktitle = {INDOCRYPT},
177 bibsource = {DBLP, http://dblp.uni-trier.de},
178 crossref = {DBLP:conf/indocrypt/2000},
179 ee = {http://link.springer.de/link/service/series/0558/bibs/1977/19770031.htm}
182 @INPROCEEDINGS{Furon05,
183 author = {Teddy Furon},
184 title = {A Survey of Watermarking Security},
188 bibsource = {DBLP, http://dblp.uni-trier.de},
189 crossref = {DBLP:conf/iwdw/2005},
190 ee = {http://dx.doi.org/10.1007/11551492_16},
192 timestamp = {2009.06.29}
196 @INPROCEEDINGS{DBLP:conf/cec/HiggsSHS10,
197 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
198 title = {Genetic algorithm feature-based resampling for protein structure
200 booktitle = {IEEE Congress on Evolutionary Computation},
203 bibsource = {DBLP, http://dblp.uni-trier.de},
204 crossref = {DBLP:conf/cec/2010},
205 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
208 @INPROCEEDINGS{Higgs2010,
209 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
210 title = {Genetic algorithm feature-based resampling for protein structure
212 booktitle = {IEEE Congress on Evolutionary Computation},
215 bibsource = {DBLP, http://dblp.uni-trier.de},
216 crossref = {DBLP:conf/cec/2010},
217 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
220 @INPROCEEDINGS{DBLP:conf/cec/HorvathC10,
221 author = {Dragos Horvath and Camelia Chira},
222 title = {Simplified chain folding models as metaheuristic benchmark for tuning
223 real protein folding algorithms?},
224 booktitle = {IEEE Congress on Evolutionary Computation},
227 bibsource = {DBLP, http://dblp.uni-trier.de},
228 crossref = {DBLP:conf/cec/2010},
229 ee = {http://dx.doi.org/10.1109/CEC.2010.5585932}
232 @INPROCEEDINGS{DBLP:conf/cec/IslamC10,
233 author = {Md. Kamrul Islam and Madhu Chetty},
234 title = {Clustered memetic algorithm for protein structure prediction},
235 booktitle = {IEEE Congress on Evolutionary Computation},
238 bibsource = {DBLP, http://dblp.uni-trier.de},
239 crossref = {DBLP:conf/cec/2010},
240 ee = {http://dx.doi.org/10.1109/CEC.2010.5586187}
243 @INPROCEEDINGS{Ker06,
244 author = {Andrew D. Ker},
245 title = {Batch Steganography and Pooled Steganalysis},
246 booktitle = {Information Hiding},
249 bibsource = {DBLP, http://dblp.uni-trier.de},
250 crossref = {DBLP:conf/ih/2006},
251 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_18},
253 timestamp = {2009.06.29}
256 @INPROCEEDINGS{Lin2009,
257 author = {H.-Y. Lin and T.-C. Chiang},
258 title = {Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic
259 Curve Based Cryptosystems},
263 bibsource = {DBLP, http://dblp.uni-trier.de},
264 crossref = {DBLP:conf/cdve/2009},
265 ee = {http://dx.doi.org/10.1007/978-3-642-04265-2_58}
268 @INPROCEEDINGS{DBLP:conf/cse/MaimourPH09,
269 author = {Moufida Maimour and CongDuc Pham and Doan B. Hoang},
270 title = {A Congestion Control Framework for Handling Video Surveillance Traffics
272 booktitle = {CSE (2)},
275 bibsource = {DBLP, http://dblp.uni-trier.de},
276 crossref = {DBLP:conf/cse/2009},
277 ee = {http://dx.doi.org/10.1109/CSE.2009.200}
280 @INPROCEEDINGS{DBLP:conf/icumt/MakhoulSP09,
281 author = {Abdallah Makhoul and Rachid Saadi and CongDuc Pham},
282 title = {Coverage and adaptive scheduling algorithms for criticality management
283 on video wireless sensor networks},
287 bibsource = {DBLP, http://dblp.uni-trier.de},
288 crossref = {DBLP:conf/icumt/2009},
289 ee = {http://dx.doi.org/10.1109/ICUMT.2009.5345630}
292 @INPROCEEDINGS{Mittelholzer99,
293 author = {Thomas Mittelholzer},
294 title = {An Information-Theoretic Approach to Steganography and Watermarking},
295 booktitle = {Information Hiding},
298 bibsource = {DBLP, http://dblp.uni-trier.de},
299 crossref = {DBLP:conf/ih/1999},
301 timestamp = {2009.06.29}
304 @INPROCEEDINGS{PellegriniBA10,
305 author = {Andrea Pellegrini and Valeria Bertacco and Todd M. Austin},
306 title = {Fault-based attack of RSA authentication},
310 bibsource = {DBLP, http://dblp.uni-trier.de},
311 crossref = {DBLP:conf/date/2010},
312 ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5456933}
315 @INPROCEEDINGS{DBLP:conf/cec/Perez-HernandezRG10,
316 author = {Luis Germ{\'a}n P{\'e}rez-Hern{\'a}ndez and Katya Rodr\'{\i}guez-V{\'a}zquez
317 and Ram{\'o}n Gardu{\~n}o-Ju{\'a}rez},
318 title = {Estimation of 3D Protein Structure by means of parallel Particle
320 booktitle = {IEEE Congress on Evolutionary Computation},
323 bibsource = {DBLP, http://dblp.uni-trier.de},
324 crossref = {DBLP:conf/cec/2010},
325 ee = {http://dx.doi.org/10.1109/CEC.2010.5586549}
328 @INPROCEEDINGS{WangNHZH07,
329 author = {Chuntao Wang and Jiangqun Ni and Jiwu Huang and Rongyue Zhang and
331 title = {Robust and High Capacity Image Watermarking Based on Jointly Coding
332 and Embedding Optimization},
333 booktitle = {Information Hiding},
336 bibsource = {DBLP, http://dblp.uni-trier.de},
337 crossref = {DBLP:conf/ih/2007},
338 ee = {http://dx.doi.org/10.1007/978-3-540-77370-2_5},
340 timestamp = {2009.06.29}
343 @INPROCEEDINGS{Zhao04,
344 author = {Jian Zhao and Mingquan Zhou and Hongmei Xie and Jinye Peng and Xin
346 title = {A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence
348 booktitle = {ISNN (2)},
351 bibsource = {DBLP, http://dblp.uni-trier.de},
352 crossref = {DBLP:conf/isnn/2004-2},
353 ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663}
356 @INPROCEEDINGS{Acharya05securecomparison,
357 author = {Acharya, Mithun and Girao, Joao and Westhoff, Dirk},
358 title = {Secure Comparison of Encrypted Data in Wireless Sensor Networks},
359 booktitle = {WIOPT '05: Proceedings of the Third International Symposium on Modeling
360 and Optimization in Mobile, Ad Hoc, and Wireless Networks},
363 address = {Washington, DC, USA},
364 publisher = {IEEE Computer Society},
365 doi = {http://dx.doi.org/10.1109/WIOPT.2005.44},
366 isbn = {0-7695-2267-X}
369 @INPROCEEDINGS{Acimez07onthe,
370 author = {Onur Acıi\c{c}mez and \c{C}etin Kaya Ko\c{c} and Jean-Pierre Seifert},
371 title = {On the power of simple branch prediction analysis },
372 booktitle = {2007 ACM Symposium on Information, Computer and Communications Security
376 publisher = {ACM Press}
380 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
381 title = {Topological entropy},
382 journal = {Trans. Amer. Math. Soc.},
387 timestamp = {2008.05.29}
390 @INPROCEEDINGS{Agrawal04,
391 author = {Agrawal, Rakesh and Kiernan, Jerry and Srikant, Ramakrishnan and
393 title = {Order preserving encryption for numeric data},
394 booktitle = {SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference
395 on Management of data},
398 address = {New York, NY, USA},
400 doi = {http://doi.acm.org/10.1145/1007568.1007632},
401 isbn = {1-58113-859-8},
402 location = {Paris, France}
405 @ARTICLE{Anfinsen20071973,
406 author = {Anfinsen, Christian B.},
407 title = {Principles that Govern the Folding of Protein Chains},
413 doi = {10.1126/science.181.4096.223},
414 eprint = {http://www.sciencemag.org/content/181/4096/223.full.pdf},
415 url = {http://www.sciencemag.org/content/181/4096/223.short}
419 author = {D. G. Arques and C. J. Michel},
420 title = {Analytical expression of the purine/pyrimidine autocorrelation function
421 after and before random mutations.},
422 journal = {Math Biosci},
428 abstract = {The mutation process is a classical evolutionary genetic process.
429 The type of mutations studied here is the random substitutions of
430 a purine base R (adenine or guanine) by a pyrimidine base Y (cytosine
431 or thymine) and reciprocally (transversions). The analytical expressions
432 derived allow us to analyze in genes the occurrence probabilities
433 of motifs and d-motifs (two motifs separated by any d bases) on the
434 R/Y alphabet under transversions. These motif probabilities can be
435 obtained after transversions (in the evolutionary sense; from the
436 past to the present) and, unexpectedly, also before transversions
437 (after back transversions, in the inverse evolutionary sense, from
438 the present to the past). This theoretical part in Section 2 is a
439 first generalization of a particular formula recently derived. The
440 application in Section 3 is based on the analytical expression giving
441 the autocorrelation function (the d-motif probabilities) before transversions.
442 It allows us to study primitive genes from actual genes. This approach
443 solves a biological problem. The protein coding genes of chloroplasts
444 and mitochondria have a preferential occurrence of the 6-motif YRY(N)6YRY
445 (maximum of the autocorrelation function for d = 6, N = R or Y) with
446 a periodicity modulo 3. The YRY(N)6YRY preferential occurrence without
447 the periodicity modulo 3 is also observed in the RNA coding genes
448 (ribosomal, transfer, and small nuclear RNA genes) and in the noncoding
449 genes (introns and 5' regions of eukaryotic nuclei). However, there
450 are two exceptions to this YRY(N)6YRY rule: the protein coding genes
451 of eukaryotic nuclei, and prokaryotes, where YRY(N)6YRY has the second
452 highest value after YRY(N)0YRY (YRYYRY) with a periodicity modulo
453 3. When we go backward in time with the analytical expression, the
454 protein coding genes of both eukaryotic nuclei and prokaryotes retrieve
455 the YRY(N)6YRY preferential occurrence with a periodicity modulo
456 3 after 0.2 back transversions per base. In other words, the actual
457 protein coding genes of chloroplasts and mitochondria are similar
458 to the primitive protein coding genes of eukaryotic nuclei and prokaryotes.
459 On the other hand, this application represents the first result concerning
460 the mutation process in the model of DNA sequence evolution we recently
461 proposed. According to this model, the actual genes on the R/Y alphabet
462 derive from two successive evolutionary genetic processes: an independent
463 mixing of a few nonrandom types of oligonucleotides leading to genes
464 called primitive followed by a mutation process in these primitive
465 genes.(ABSTRACT TRUNCATED AT 400 WORDS)},
466 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
468 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Mathematics; Models,
469 Genetic; Mutation; Probability; Proteins, genetics; Purines; Pyrimidines},
471 medline-pst = {ppublish},
473 pii = {0025-5564(94)90020-5},
475 timestamp = {2011.05.05}
479 author = {D. G. Arquès and J. P. Fallot and C. J. Michel},
480 title = {An evolutionary analytical model of a complementary circular code
481 simulating the protein coding genes, the 5' and 3' regions.},
482 journal = {Bull Math Biol},
488 abstract = {The self-complementary subset T0 = X0 [symbol: see text] ¿AAA, TTT¿
489 with X0 = ¿AAC, AAT, ACC, ATC, ATT, CAG, CTC, CTG, GAA, GAC, GAG,
490 GAT, GCC, GGC, GGT, GTA, GTC, GTT, TAC, TTC¿ of 22 trinucleotides
491 has a preferential occurrence in the frame 0 (reading frame established
492 by the ATG start trinucleotide) of protein (coding) genes of both
493 prokaryotes and eukaryotes. The subsets T1 = X1 [symbol: see text]
494 ¿CCC¿ and T2 = X2 [symbol: see text] ¿GGG¿ of 21 trinucleotides have
495 a preferential occurrence in the shifted frames 1 and 2 respectively
496 (frame 0 shifted by one and two nucleotides respectively in the 5'-3'
497 direction). T1 and T2 are complementary to each other. The subset
498 T0 contains the subset X0 which has the rarity property (6 x 10(-8)
499 to be a complementary maximal circular code with two permutated maximal
500 circular codes X1 and X2 in the frames 1 and 2 respectively. X0 is
501 called a C3 code. A quantitative study of these three subsets T0,
502 T1, T2 in the three frames 0, 1, 2 of protein genes, and the 5' and
503 3' regions of eukaryotes, shows that their occurrence frequencies
504 are constant functions of the trinucleotide positions in the sequences.
505 The frequencies of T0, T1, T2 in the frame 0 of protein genes are
506 49, 28.5 and 22.5\% respectively. In contrast, the frequencies of
507 T0, T1, T2 in the 5' and 3' regions of eukaryotes, are independent
508 of the frame. Indeed, the frequency of T0 in the three frames of
509 5' (respectively 3') regions is equal to 35.5\% (respectively 38\%)
510 and is greater than the frequencies T1 and T2, both equal to 32.25\%
511 (respectively 31\%) in the three frames. Several frequency asymmetries
512 unexpectedly observed (e.g. the frequency difference between T1 and
513 T2 in the frame 0), are related to a new property of the subset T0
514 involving substitutions. An evolutionary analytical model at three
515 parameters (p, q, t) based on an independent mixing of the 22 codons
516 (trinucleotides in frame 0) of T0 with equiprobability (1/22) followed
517 by t approximately 4 substitutions per codon according to the proportions
518 p approximately 0.1, q approximately 0.1 and r = 1 - p - q approximately
519 0.8 in the three codon sites respectively, retrieves the frequencies
520 of T0, T1, T2 observed in the three frames of protein genes and explains
521 these asymmetries. Furthermore, the same model (0.1, 0.1, t) after
522 t approximately 22 substitutions per codon, retrieves the statistical
523 properties observed in the three frames of the 5' and 3' regions.
524 The complex behaviour of these analytical curves is totally unexpected
525 and a priori difficult to imagine.},
526 doi = {10.1006/bulm.1997.0033},
527 institution = {Equipe de Biologie Théorique, Université de Marne la Vallée, Institut
528 Gaspard Monge, Noisy Le Grand, France. arques@univ-mlv.fr},
529 keywords = {Animals; Biological Evolution; Codon, genetics; Genetic Code; Humans;
530 Mammals; Models, Genetic; Probability; Proteins, genetics; Rodentia;
533 medline-pst = {ppublish},
535 pii = {S0092-8240(97)90033-1},
537 timestamp = {2011.05.05},
538 url = {http://dx.doi.org/10.1006/bulm.1997.0033}
542 author = {D. G. Arquès and C. J. Michel},
543 title = {Analytical expression of the purine/pyrimidine codon probability
544 after and before random mutations.},
545 journal = {Bull Math Biol},
548 pages = {1025--1038},
551 abstract = {Recently, we proposed a new model of DNA sequence evolution (Arquès
552 and Michel. 1990b. Bull. math. Biol. 52, 741-772) according to which
553 actual genes on the purine/pyrimidine (R/Y) alphabet (R = purine
554 = adenine or guanine, Y = pyrimidine = cytosine or thymine) are the
555 result of two successive evolutionary genetic processes: (i) a mixing
556 (independent) process of non-random oligonucleotides (words of base
557 length less than 10: YRY(N)6, YRYRYR and YRYYRY are so far identified;
558 N = R or Y) leading to primitive genes (words of several hundreds
559 of base length) and followed by (ii) a random mutation process, i.e.,
560 transformations of a base R (respectively Y) into the base Y (respectively
561 R) at random sites in these primitive genes. Following this model
562 the problem investigated here is the study of the variation of the
563 8 R/Y codon probabilities RRR, ..., YYY under random mutations. Two
564 analytical expressions solved here allow analysis of this variation
565 in the classical evolutionary sense (from the past to the present,
566 i.e., after random mutations), but also in the inverted evolutionary
567 sense (from the present to the past, i.e., before random mutations).
568 Different properties are also derived from these formulae. Finally,
569 a few applications of these formulae are presented. They prove the
570 proposition in Arquès and Michel (1990b. Bull. math. Biol. 52, 741-772),
571 Section 3.3.2, with the existence of a maximal mean number of random
572 mutations per base of the order 0.3 in the protein coding genes.
573 They also confirm the mixing process of oligonucleotides by excluding
574 the purine/pyrimidine contiguous and alternating tracts from the
575 formation process of primitive genes.},
576 institution = {Université de Franche-Comté, Besançon, France.},
577 keywords = {Base Sequence; Codon; DNA, chemistry/genetics; Mathematics; Models,
578 Genetic; Mutation; Probability; Purines; Pyrimidines},
580 medline-pst = {ppublish},
583 timestamp = {2011.05.05}
586 @ARTICLE{Arques1993b,
587 author = {D. G. Arquès and C. J. Michel},
588 title = {Identification and simulation of new non-random statistical properties
589 common to different eukaryotic gene subpopulations.},
590 journal = {Biochimie},
595 abstract = {The nucleotide distribution in protein coding genes, introns and transfer
596 RNA genes of eukaryotic subpopulations (primates, rodent and mammals)
597 is studied by autocorrelation functions. The autocorrelation function
598 analysing the occurrence probability of the i-motif YRY(N)iYRY (YRY-function)
599 in protein coding genes and transfer RNA genes of these three eukaryotic
600 subpopulations retrieves the preferential occurrence of YRY(N)6YRY
601 (R = purine = adenine or guanine, Y = pyrimidine = cytosine or thymine,
602 N = R or Y). The autocorrelation functions analysing the occurrence
603 probability of the i-motifs RRR(N)iRRR (RRR-function) and YYY(N)iYYY
604 (YYY-function) identify new non-random genetic statistical properties
605 in these three eukaryotic subpopulations, mainly: i) in their protein
606 coding genes: local maxima for i identical to 6 [12] (peaks for i
607 = 6, 18, 30, 42) with the RRR-function and local maxima for i identical
608 to 8 [10] (peaks for i = 8, 18, 28) with the YYY-function; and ii)
609 in their introns: local maxima for i identical to 3 [6] (peaks for
610 i = 3, 9, 15) and a short linear decrease followed by a large exponential
611 decrease both with the RRR- and YYY-functions. The non-random properties
612 identified in eukaryotic intron subpopulations are modelised with
613 a process of random insertions and deletions of nucleotides simulating
615 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
616 d'Informatique de Besançon, France.},
617 keywords = {Animals; Base Sequence; Data Interpretation, Statistical; Genes; Introns;
618 Mammals; Models, Genetic; Primates; Probability; Proteins, genetics;
619 RNA Editing; RNA, Transfer, genetics; Rodentia; Sequence Analysis,
622 medline-pst = {ppublish},
624 pii = {0300-9084(93)90173-P},
626 timestamp = {2011.05.05}
630 author = {D. G. Arquès and C. J. Michel},
631 title = {A simulation of the genetic periodicities modulo 2 and 3 with processes
632 of nucleotide insertions and deletions.},
633 journal = {J Theor Biol},
639 abstract = {Recently, a new genetic process termed RNA editing has been identified
640 showing insertions and deletions of nucleotides in particular RNA
641 molecules. On the other hand, there are a few non-random statistical
642 properties in genes: in particular, the periodicity modulo 3 (P3)
643 associated with an open reading frame, the periodicity modulo 2 (P2)
644 associated with alternating purine/pyrimidine stretches, the YRY(N)6YRY
645 preferential occurrence (R = purine = adenine or guanine, Y = pyrimidine
646 = cytosine or thymine, N = R or Y) representing a "code" of the DNA
647 helix pitch, etc. The problem investigated here is whether a process
648 of the type RNA editing can lead to the non-random statistical properties
649 commonly observed in genes. This paper will show in particular that:
650 The process of insertions and deletions of mononucleotides in the
651 initial sequence [YRY(N)3]* [series of YRY(N)3] can lead to the periodicity
652 modulo 2 (P2). The process of insertions and deletions of trinucleotides
653 in the initial sequence [YRY(N)6]* [series of YRY(N)6] can lead to
654 the periodicity modulo 3 (P3) and the YRY(N)6YRY preferential occurrence.
655 Furthermore, these two processes lead to a strong correlation with
656 the reality, namely the mononucleotide insertion/deletion process,
657 with the 5' eukaryotic regions and the trinucleotide insertion/deletion
658 process, with the eukaryotic protein coding genes.},
659 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
660 Unité Associée CNRS No 822, France.},
661 keywords = {Chromosome Deletion; Computer Simulation; Humans; Models, Genetic;
662 Mutagenesis, genetics; RNA, genetics},
664 medline-pst = {ppublish},
667 timestamp = {2011.05.05}
671 author = {D. G. Arquès and C. J. Michel},
672 title = {Periodicities in coding and noncoding regions of the genes.},
673 journal = {J Theor Biol},
679 abstract = {Gene population statistical studies of protein coding genes and introns
680 have identified two types of periodicities on the purine/pyrimidine
681 alphabet: (i) the modulo 3 periodicity or coding periodicity (periodicity
682 P3) in protein coding genes of eukaryotes, prokaryotes, viruses,
683 chloroplasts, mitochondria, plasmids and in introns of viruses and
684 mitochondria, and (ii) the modulo 2 periodicity (periodicity P2)
685 in the eukaryotic introns. The periodicity study is herein extended
686 to the 5' and 3' regions of eukaryotes, prokaryotes and viruses and
687 shows: (i) the periodicity P3 in the 5' and 3' regions of eukaryotes.
688 Therefore, these observations suggest a unitary and dynamic concept
689 for the genes as for a given genome, the 5' and 3' regions have the
690 genetic information for protein coding genes and for introns: (1)
691 In the eukaryotic genome, the 5' (P2 and P3) and 3' (P2 and P3) regions
692 have the information for protein coding genes (P3) and for introns
693 (P2). The intensity of P3 is high in 5' regions and weak in 3' regions,
694 while the intensity of P2 is weak in 5' regions and high in 3' regions.
695 (2) In the prokaryotic genome, the 5' (P3) and 3' (P3) regions have
696 the information for protein coding genes (P3). (3) In the viral genome,
697 the 5' (P3) and 3' (P3) regions have the information for protein
698 coding genes (P3) and for introns (P3). The absence of P2 in viral
699 introns (in opposition to eukaryotic introns) may be related to the
700 absence of P2 in 5' and 3' regions of viruses.},
701 institution = {Université de Franche-Comté, Unité Associée CNRS No. 822, Besançon,
703 keywords = {Animals; Base Sequence; Eukaryotic Cells; Genes; Introns; Prokaryotic
704 Cells; Purine Nucleotides; Pyrimidine Nucleotides; Repetitive Sequences,
705 Nucleic Acid; Viruses, genetics},
707 medline-pst = {ppublish},
710 timestamp = {2011.05.05}
713 @ARTICLE{Arques1990a,
714 author = {D. G. Arquès and C. J. Michel},
715 title = {A model of DNA sequence evolution.},
716 journal = {Bull Math Biol},
721 abstract = {Statistical studies of gene populations on the purine/pyrimidine alphabet
722 have shown that the mean occurrence probability of the i-motif YRY(N)iYRY
723 (R = purine, Y = pyrimidine, N = R or Y) is not uniform by varying
724 i in the range, but presents a maximum at i = 6 in the following
725 populations: protein coding genes of eukaryotes, prokaryotes, chloroplasts
726 and mitochondria, and also viral introns, ribosomal RNA genes and
727 transfer RNA genes (Arquès and Michel, 1987b, J. theor. Biol. 128,
728 457-461). From the "universality" of this observation, we suggested
729 that the oligonucleotide YRY(N)6 is a primitive one and that it has
730 a central function in DNA sequence evolution (Arquès and Michel,
731 1987b, J. theor. Biol. 128, 457-461). Following this idea, we introduce
732 a concept of a model of DNA sequence evolution which will be validated
733 according to a schema presented in three parts. In the first part,
734 using the last version of the gene database, the YRY(N)6YRY preferential
735 occurrence (maximum at i = 6) is confirmed for the populations mentioned
736 above and is extended to some newly analysed populations: chloroplast
737 introns, chloroplast 5' regions, mitochondrial 5' regions and small
738 nuclear RNA genes. On the other hand, the YRY(N)6YRY preferential
739 occurrence and periodicities are used in order to classify 18 gene
740 populations. In the second part, we will demonstrate that several
741 statistical features characterizing different gene populations (in
742 particular the YRY(N)6YRY preferential occurrence and the periodicities)
743 can be retrieved from a simple Markov model based on the mixing of
744 the two oligonucleotides YRY(N)6 and YRY(N)3 and based on the percentages
745 of RYR and YRY in the unspecified trinucleotides (N)3 of YRY(N)6
746 and YRY(N)3. Several properties are identified and prove in particular
747 that the oligonucleotide mixing is an independent process and that
748 several different features are functions of a unique parameter. In
749 the third part, the return of the model to the reality shows a strong
750 correlation between reality and simulation concerning the presence
751 of a large alternating purine/pyrimidine stretches and of periodicities.
752 It also contributes to a greater understanding of biological reality,
753 e.g. the presence or the absence of large alternating purine/pyrimidine
754 stretches can be explained as being a simple consequence of the mixing
755 of two particular oligonucleotides. Finally, we believe that such
756 an approach is the first step toward a unified model of DNA sequence
757 evolution allowing the molecular understanding of both the origin
758 of life and the actual biological reality.},
759 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
760 Unité Associée CNRS No 822, France.},
761 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Genetics, Population;
764 medline-pst = {ppublish},
767 timestamp = {2011.05.05}
770 @ARTICLE{Arques1993a,
771 author = {D. G. Arquès and C. J. Michel and K. Orieux},
772 title = {Identification and simulation of new non-random statistical properties
773 common to different populations of eukaryotic non-coding genes.},
774 journal = {J Theor Biol},
780 abstract = {The autocorrelation function analysing the occurrence probability
781 of the i-motif YRY(N)iYRY in genes allows the identification of mainly
782 two periodicities modulo 2, 3 and the preferential occurrence of
783 the motif YRY(N)6YRY (R = purine = adenine or guanine, Y = pyrimidine
784 = cytosine or thymine, N = R or Y). These non-random genetic statistical
785 properties can be simulated by an independent mixing of the three
786 oligonucleotides YRYRYR, YRYYRY and YRY(N)6 (Arquès & Michel, 1990b).
787 The problem investigated in this study is whether new properties
788 can be identified in genes with other autocorrelation functions and
789 also simulated with an oligonucleotide mixing model. The two autocorrelation
790 functions analysing the occurrence probability of the i-motifs RRR(N)iRRR
791 and YYY(N)iYYY simultaneously identify three new non-random genetic
792 statistical properties: a short linear decrease, local maxima for
793 i identical to 3[6] (i = 3, 9, etc) and a large exponential decrease.
794 Furthermore, these properties are common to three different populations
795 of eukaryotic non-coding genes: 5' regions, introns and 3' regions
796 (see section 2). These three non-random properties can also be simulated
797 by an independent mixing of the four oligonucleotides R8, Y8, RRRYRYRRR,
798 YYYRYRYYY and large alternating R/Y series. The short linear decrease
799 is a result of R8 and Y8, the local maxima for i identical to 3[6],
800 of RRRYRYRRR and YYYRYRYYY, and the large exponential decrease, of
801 large alternating R/Y series (section 3). The biological meaning
802 of these results and their relation to the previous oligonucleotide
803 mixing model are presented in the Discussion.},
804 doi = {10.1006/jtbi.1993.1059},
805 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
806 d'Informatique de Besançon, France.},
807 keywords = {Animals; Biological Evolution; Genes, genetics; Models, Genetic; Models,
808 Statistical; Mutation, genetics; Oligonucleotides, genetics; Probability},
810 medline-pst = {ppublish},
812 pii = {S0022-5193(83)71059-3},
814 timestamp = {2011.05.05},
815 url = {http://dx.doi.org/10.1006/jtbi.1993.1059}
819 author = {David Arroyo and Gonzalo Alvarez and Veronica Fernandez},
820 title = {On the inadequacy of the logistic map for cryptographic applications},
821 journal = {X Reunión Española sobre Criptología y Seguridad de la Información
826 owner = {christophe},
827 timestamp = {2010.03.01}
830 @MISC{Backofen99algorithmicapproach,
831 author = {R. Backofen and S. Will and P. Clote},
832 title = {Algorithmic Approach To Quantifying The Hydrophobic Force Contribution
838 @inproceedings{Blum:1985:EPP:19478.19501,
839 author = {Blum, Manuel and Goldwasser, Shafi},
840 title = {An efficient probabilistic public key encryption scheme which hides all partial information},
841 booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology},
843 isbn = {0-387-15658-5},
844 location = {Santa Barbara, California, United States},
847 url = {http://dl.acm.org/citation.cfm?id=19478.19501},
849 publisher = {Springer-Verlag New York, Inc.},
850 address = {New York, NY, USA},
851 keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption},
855 @INPROCEEDINGS{bcgr11:ip,
856 author = {Bahi, Jacques M. and Couchot, Jean-fran\c{c}ois and Guyeux, Christophe
857 and Richard, Adrien},
858 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic
859 Boolean Discrete-Time Dynamical Systems},
860 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
865 address = {Oslo, Norway},
868 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
874 author = {Bahi, Jacques M. and Guyeux, Christophe},
875 title = {Hash Functions Using Chaotic Iterations},
876 journal = {Journal of Algorithms \& Computational Technology},
882 doi = {10.1260/1748-3018.4.2.167},
883 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
888 url = {http://dx.doi.org/10.1260/1748-3018.4.2.167}
891 @INPROCEEDINGS{guyeux10ter,
892 author = {Bahi, Jacques M. and Guyeux, Christophe},
893 title = {A new chaos-based watermarking algorithm},
894 booktitle = {SECRYPT'10, Int. conf. on security and cryptography},
897 address = {Athens, Greece},
899 publisher = {SciTePress},
901 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
906 @INPROCEEDINGS{bgc11:ip,
907 author = {Bahi, Jacques M. and Guyeux, Christophe and Cote, Nathalie},
908 title = {Chaos of Protein Folding},
909 booktitle = {IJCNN 2011, Int. Joint Conf. on Neural Networks},
912 address = {San Jose, California, United States},
916 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
921 @INPROCEEDINGS{guyeux10bis,
922 author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah},
923 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
925 booktitle = {SENSORCOMM'10, 4-th Int. Conf. on Sensor Technologies and Applications},
928 address = {Venice-Mestre, Italy},
931 doi = {10.1109/SENSORCOMM.2010.76},
932 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
935 url = {http://dx.doi.org/10.1109/SENSORCOMM.2010.76}
938 @INPROCEEDINGS{guyeuxVictoria,
939 author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah},
940 title = {Secure Data Aggregation in Wireless Sensor Networks. Homomorphism
941 versus Watermarking Approach},
942 booktitle = {ADHOCNETS 2010, 2nd Int. Conf. on Ad Hoc Networks},
945 series = {Lecture Notes in ICST},
947 address = {Victoria, Canada},
950 doi = {10.1007/978-3-642-17994-5_23},
951 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
954 url = {http://dx.doi.org/10.1007/978-3-642-17994-5_23}
957 @INPROCEEDINGS{bgs11:ip,
958 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
959 title = {Building a Chaotic Proven Neural Network},
960 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network
964 address = {Maldives, Maldives},
967 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
972 @INPROCEEDINGS{bgw10:ip,
973 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
974 title = {A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application
976 booktitle = {WISM 2010, Int. Conf. on Web Information Systems and Mining},
981 address = {Sanya, China},
984 doi = {10.1007/978-3-642-16515-3_26},
985 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
988 url = {http://dx.doi.org/10.1007/978-3-642-16515-3_26}
991 @INPROCEEDINGS{bgw09:ip,
992 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
993 title = {A novel pseudo-random generator based on discrete chaotic iterations},
994 booktitle = {INTERNET'09, 1-st Int. Conf. on Evolving Internet},
997 address = {Cannes, France},
1000 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1005 @INPROCEEDINGS{bmg10:onp,
1006 author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe},
1007 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
1008 Networks for critical applications},
1009 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
1010 et Applications Critiques de Surveillance},
1012 address = {Bayonne, France},
1014 note = {Communication orale},
1016 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1021 @INPROCEEDINGS{guyeuxBayonne,
1022 author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe},
1023 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
1024 Networks for critical applications},
1025 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
1026 et Applications Critiques de Surveillance},
1028 address = {Bayonne, France},
1030 note = {Communication orale},
1037 author = {Bahi, Jacques M. and Salomon, Michel},
1038 title = {A Decentralized Energy-based Diffusion Algorithm to Increase the
1039 Lifetime of {MANETs}},
1040 journal = {Computer Networks Journal},
1043 note = {Accepted manuscript. To appear},
1044 classement = {ACLI},
1046 impact-factor = {1.201},
1049 publisher = {Elsevier}
1053 author = {J. M. Bahi},
1054 title = {Boolean totally asynchronous iterations},
1055 journal = {Int. Journal of Mathematical Algorithms},
1060 timestamp = {17/02/2008}
1063 @ARTICLE{Bahi2000bis,
1064 author = {Jacques M. Bahi},
1065 title = {Asynchronous iterative algorithms for nonexpansive linear systems},
1066 journal = {Journal of Parallel and Distributed Computing},
1071 timestamp = {2009.01.10}
1075 author = {J. M. Bahi},
1076 title = {Parallel synchronous chaotic iterations for singular linear systems},
1077 journal = {Parallel Algorithms and Applications},
1082 timestamp = {17/02/2008}
1086 author = {Jacques M. Bahi},
1087 title = {Algorithmes paralleles asynchrones pour les systemes singuliers},
1088 journal = {Comptes Rendus de l'Academie des Sciences},
1090 volume = {t. 326, serie 1},
1091 pages = {1421--1425},
1093 timestamp = {2009.01.18}
1097 author = {Jacques M. Bahi},
1098 title = {Méthodes itératives dans des espaces produits. Application au calcul
1100 school = {Université de Franche-Comté},
1102 type = {Habilitation à diriger des recherches},
1103 owner = {christophe},
1104 timestamp = {2010.08.24}
1108 author = {Jacques M. Bahi},
1109 title = {Algorithmes asynchrones pour des systèmes différentiels-algébriques.
1110 Simulation numérique sur des exemples de circuits électriques},
1111 school = {Université de Franche-Comté},
1113 owner = {christophe},
1114 timestamp = {2010.08.24}
1118 author = {Jacques M. Bahi and Sylvain Contassot-Vivier},
1119 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
1121 journal = {IEEE Transactions on Neural Networks},
1128 timestamp = {2009.12.04}
1132 author = {J.~M. Bahi and S. Contassot-Vivier},
1133 title = {Stability of fully asynchronous discrete-time discrete state dynamic
1135 journal = {IEEE Transactions on Neural Networks},
1138 pages = {1353-1363},
1140 timestamp = {2009.02.14}
1143 @TECHREPORT{bcgg10:ir,
1144 author = {Bahi, J. M. and Couchot, J.-F. and Grasset, O. and Guyeux, C.},
1145 title = {{D}iscrete {D}ynamical {S}ystems: {N}ecessary {D}ivergence {C}onditions
1146 for {S}ynchronous {I}terations},
1147 institution = {LIFC - Laboratoire d'{I}nformatique de l'{U}niversit\'{e} de {F}ranche
1150 type = {Research Report},
1151 number = {RR2010-04},
1153 pdf = {/~publis/papers/pub/2010/RR2010-04.pdf}
1157 author = {Bahi, Jacques M. and Guyeux, Christophe},
1158 title = {Hash Functions Using Chaotic Iterations},
1159 journal = {Journal of Algorithms \& Computational Technology},
1164 classement = {ACLNI},
1165 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1167 impact-factor = {#},
1172 @INPROCEEDINGS{guyeux10,
1173 author = {Bahi, Jacques M. and Guyeux, Christophe},
1174 title = {Topological chaos and chaotic iterations, application to Hash functions},
1175 booktitle = {WCCI'10, IEEE World Congress on Computational Intelligence},
1178 address = {Barcelona, Spain},
1180 note = {Best paper award},
1181 classement = {ACTI},
1182 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1188 author = {Jacques M. Bahi and Christophe Guyeux},
1189 title = {A chaos-based approach for information hiding security.},
1190 howpublished = {arXiv},
1193 institution = {Computer Science Laboratory LIFC, University of Franche-Comte, France}
1197 author = {Jacques M. Bahi and Christophe Guyeux},
1198 title = {A watermarking algorithm satisfying topological chaos properties},
1201 volume = {abs/0810.4713},
1202 bibsource = {DBLP, http://dblp.uni-trier.de},
1203 ee = {http://arxiv.org/abs/0810.4713}
1207 author = {Jacques M. Bahi and Christophe Guyeux},
1208 title = {Chaotic iterations and topological chaos},
1210 abstract = {Chaotic iterations have been introduced on the one hand by Chazan,
1211 Miranker [5] and Miellou [9] in a numerical analysis context, and
1212 on the other hand by Robert [11] and Pellegrin [10] in the discrete
1213 dynamical systems framework. In both cases, the objective was to
1214 derive conditions of convergence of such iterations to a fixed state.
1215 In this paper, a new point of view is presented, the goal here is
1216 to derive conditions under which chaotic iterations admit a chaotic
1217 behaviour in a rigorous mathematical sense. Contrary to what has
1218 been studied in the literature, convergence is not desired. More
1219 precisely, we establish in this paper a link between the concept
1220 of chaotic iterations on a finite set and the notion of topological
1221 chaos [8], [6], [7]. We are motivated by concrete applications of
1222 our approach, such as the use of chaotic boolean iterations in the
1223 computer security field. Indeed, the concept of chaos is used in
1224 many areas of data security without real rigorous theoretical foundations,
1225 and without using the fundamental properties that allow chaos. The
1226 wish of this paper is to bring a bit more mathematical rigour in
1228 citeseerurl = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1230 comments = {6 pages},
1231 eprint = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1232 oai2identifier = {0810.3154},
1234 timestamp = {2008.10.23},
1235 url = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}}
1238 @ARTICLE{arxivRNNchaos,
1239 author = {Jacques M. Bahi and Christophe Guyeux and Michel Salomon},
1240 title = {Building a Chaotic Proved Neural Network},
1243 volume = {abs/1101.4351},
1244 ee = {http://arxiv.org/abs/1101.4351}
1247 @INPROCEEDINGS{guyeuxTaiwan10,
1248 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
1249 title = {Improving random number generators by chaotic iterations. Application
1251 booktitle = {ICCASM 2010, Int. Conf. on Computer Application and System Modeling},
1253 pages = {V13-643--V13-647},
1254 address = {Taiyuan, China},
1256 classement = {ACTI},
1257 doi = {10.1109/ICCASM.2010.5622199},
1258 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1261 url = {http://dx.doi.org/10.1109/ICCASM.2010.5622199}
1265 author = {Jacques M Bahi and Christian J Michel},
1266 title = {A stochastic model of gene evolution with time dependent pseudochaotic
1268 journal = {Bull Math Biol},
1274 abstract = {We develop here a new class of stochastic models of gene evolution
1275 in which a random subset of the 64 possible trinucleotides mutates
1276 at each evolutionary time t according to some time dependent substitution
1277 probabilities. Therefore, at each time t, the numbers and the types
1278 of mutable trinucleotides are unknown. Thus, the mutation matrix
1279 changes at each time t. This pseudochaotic model developed generalizes
1280 the standard model in which all the trinucleotides mutate at each
1281 time t. It determines the occurrence probabilities at time t of trinucleotides
1282 which pseudochaotically mutate according to 3 time dependent substitution
1283 parameters associated with the 3 trinucleotide sites. The main result
1284 proves that under suitable assumptions, this pseudochaotic model
1285 converges to a uniform probability vector identical to that of the
1286 standard model. Furthermore, an application of this pseudochaotic
1287 model allows an evolutionary study of the 3 circular codes identified
1288 in both eukaryotic and prokaryotic genes. A circular code is a particular
1289 set of trinucleotides whose main property is the retrieval of the
1290 frames in genes locally, i.e., anywhere in genes and particularly
1291 without start codons, and automatically with a window of a few nucleotides.
1292 After a certain evolutionary time and with particular time dependent
1293 functions for the 3 substitution parameters, precisely an exponential
1294 decrease in the 1st and 2nd trinucleotide sites and an exponential
1295 increase in the 3rd one, this pseudochaotic model retrieves the main
1296 statistical properties of the 3 circular codes observed in genes.
1297 Furthermore, it leads to a circular code asymmetry stronger than
1298 the standard model (nonpseudochaotic) and, therefore, to a better
1299 correlation with the genes.},
1300 doi = {10.1007/s11538-008-9376-4},
1301 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1302 90016, Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1303 keywords = {Evolution, Molecular; Genes; Models, Genetic; Mutation; Stochastic
1306 medline-pst = {ppublish},
1309 timestamp = {2011.05.05},
1310 url = {http://dx.doi.org/10.1007/s11538-008-9376-4}
1314 author = {Jacques M Bahi and Christian J Michel},
1315 title = {A stochastic model of gene evolution with chaotic mutations.},
1316 journal = {J Theor Biol},
1322 abstract = {We develop here a new class of stochastic models of gene evolution
1323 in which the mutations are chaotic, i.e. a random subset of the 64
1324 possible trinucleotides mutates at each evolutionary time t according
1325 to some substitution probabilities. Therefore, at each time t, the
1326 numbers and the types of mutable trinucleotides are unknown. Thus,
1327 the mutation matrix changes at each time t. The chaotic model developed
1328 generalizes the standard model in which all the trinucleotides mutate
1329 at each time t. It determines the occurrence probabilities at time
1330 t of trinucleotides which chaotically mutate according to three substitution
1331 parameters associated with the three trinucleotide sites. Two theorems
1332 prove that this chaotic model has a probability vector at each time
1333 t and that it converges to a uniform probability vector identical
1334 to that of the standard model. Furthermore, four applications of
1335 this chaotic model (with a uniform random strategy for the 64 trinucleotides
1336 and with a particular strategy for the three stop codons) allow an
1337 evolutionary study of the three circular codes identified in both
1338 eukaryotic and prokaryotic genes. A circular code is a particular
1339 set of trinucleotides whose main property is the retrieval of the
1340 frames in genes locally, i.e. anywhere in genes and particularly
1341 without start codons, and automatically with a window of a few nucleotides.
1342 After a certain evolutionary time and with particular values for
1343 the three substitution parameters, the chaotic models retrieve the
1344 main statistical properties of the three circular codes observed
1345 in genes. These applications also allow an evolutionary comparison
1346 between the standard and chaotic models.},
1347 doi = {10.1016/j.jtbi.2008.07.028},
1348 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1349 90016 Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1350 keywords = {Animals; Computer Simulation; DNA, Circular, genetics; Evolution,
1351 Molecular; Genetic Code; Models, Genetic; Mutation; Nonlinear Dynamics;
1352 Stochastic Processes; Time},
1354 medline-pst = {ppublish},
1356 pii = {S0022-5193(08)00395-0},
1358 timestamp = {2011.05.05},
1359 url = {http://dx.doi.org/10.1016/j.jtbi.2008.07.028}
1362 @ARTICLE{Bahi2008bis,
1363 author = {Bahi, J. M. and Michel, C. J.},
1364 title = {A stochastic model of gene evolution with chaotic mutations},
1365 journal = {Journal of Theoretical Biology},
1370 timestamp = {2009.01.10}
1374 author = {Jacques M Bahi and Christian J Michel},
1375 title = {A stochastic gene evolution model with time dependent mutations.},
1376 journal = {Bull Math Biol},
1382 abstract = {We develop here a new class of gene evolution models in which the
1383 nucleotide mutations are time dependent. These models allow to study
1384 nonlinear gene evolution by accelerating or decelerating the mutation
1385 rates at different evolutionary times. They generalize the previous
1386 ones which are based on constant mutation rates. The stochastic model
1387 developed in this class determines at some time t the occurrence
1388 probabilities of trinucleotides mutating according to 3 time dependent
1389 substitution parameters associated with the 3 trinucleotide sites.
1390 Therefore, it allows to simulate the evolution of the circular code
1391 recently observed in genes. By varying the class of function for
1392 the substitution parameters, 1 among 12 models retrieves after mutation
1393 the statistical properties of the observed circular code in the 3
1394 frames of actual genes. In this model, the mutation rate in the 3rd
1395 trinucleotide site increases during gene evolution while the mutation
1396 rates in the 1st and 2nd sites decrease. This property agrees with
1397 the actual degeneracy of the genetic code. This approach can easily
1398 be generalized to study evolution of motifs of various lengths, e.g.,
1399 dicodons, etc., with time dependent mutations.},
1400 doi = {10.1016/j.bulm.2003.10.004},
1401 institution = {LIFC - FRE CNRS 2661, IUT de Belfort, Université de Franche-Comté,
1402 BP 527, 90016 Belfort Cédex, France. bahi@iut-bm.univ-fcomte.fr},
1403 keywords = {Codon, genetics; Evolution, Molecular; Genes, genetics; Genetic Code,
1404 genetics; Models, Genetic; Mutation; Stochastic Processes},
1406 medline-pst = {ppublish},
1408 pii = {S0092824003001174},
1410 timestamp = {2011.05.05},
1411 url = {http://dx.doi.org/10.1016/j.bulm.2003.10.004}
1415 author = {J. Banks and J. Brooks and G. Cairns and P. Stacey},
1416 title = {On Devaney's Definition of Chaos},
1417 journal = {Amer. Math. Monthly},
1423 timestamp = {27/01/2008}
1427 author = {E. Barker and A. Roginsky},
1428 title = {DRAFT NIST Special Publication 800-131 Recommendation for the Transitioning
1429 of Cryptographic Algorithms and Key Sizes},
1431 owner = {christophe},
1432 timestamp = {2010.08.18}
1436 author = {Mauro Barni and Franco Bartolini and Teddy Furon},
1437 title = {A general framework for robust watermarking security},
1438 journal = {Signal Processing},
1441 pages = {2069-2084},
1443 note = {Special issue on Security of Data Hiding Technologies, invited paper},
1444 bibsource = {DBLP, http://dblp.uni-trier.de},
1445 ee = {http://dx.doi.org/10.1016/S0165-1684(03)00168-3},
1447 timestamp = {2009.06.30}
1451 author = {Baudet, G\'{e}rard M.},
1452 title = {Asynchronous Iterative Methods for Multiprocessors},
1458 address = {New York, NY, USA},
1459 doi = {http://doi.acm.org/10.1145/322063.322067},
1465 author = {Didier El Baz},
1466 title = {Contribution à l'algorithmique parallèle. Le concept d'asynchronisme
1467 : étude théorique, mise en œuvre, et application},
1468 school = {Institut national polytechnique de Toulouse},
1470 type = {Habilitation à diriger des recherches},
1471 owner = {christophe},
1472 timestamp = {2010.08.24}
1476 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1477 title = {Contention awareness and fault-tolerant scheduling for precedence
1478 constrained tasks in heterogeneous systems},
1479 journal = {Parallel Computing},
1485 doi = {10.1016/j.parco.2008.11.001},
1488 url = {http://dx.doi.org/10.1016/j.parco.2008.11.001}
1491 @INPROCEEDINGS{bhr08b:bl,
1492 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1493 title = {Fault tolerant scheduling of precedence task graphs on heterogeneous
1495 booktitle = {IPDPS'08},
1498 publisher = {IEEE Computer Society Press},
1504 @INPROCEEDINGS{Berger98,
1505 author = {Berger, Bonnie and Leighton, Tom},
1506 title = {Protein folding in the hydrophobic-hydrophilic (HP) is NP-complete},
1507 booktitle = {Proceedings of the second annual international conference on Computational
1510 series = {RECOMB '98},
1512 address = {New York, NY, USA},
1515 isbn = {0-89791-976-9},
1516 location = {New York, New York, United States},
1521 title = {Parallel and distributed computation: numerical methods},
1522 publisher = {Prentice-Hall, Inc.},
1524 author = {Bertsekas, Dimitri P. and Tsitsiklis, John N.},
1525 address = {Upper Saddle River, NJ, USA},
1526 isbn = {0-13-648700-9}
1529 @MISC{Bertsekas88paralleland,
1530 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
1531 title = {Parallel and distributed iterative algorithms: a selective survey},
1536 author = {F. Blanchard and E. Glasner and S. Kolyada and A.Maass},
1537 title = {On Li-Yorke pairs},
1541 timestamp = {2008.01.02}
1545 author = {F. Blanchard and B. Host and S. Ruette},
1546 title = {Asymptotic pairs in positive-entropy systems},
1548 optannote = {to appear in Ergod. Th. Dynam. Sys.},
1551 timestamp = {2008.01.02}
1555 author = {Dan Boneh and Matt Franklin},
1556 title = {Identity-Based Encryption from the {Weil} Pairing},
1557 journal = {SIAM J. of Computing},
1562 note = {Extended abstract in Crypto'01}
1565 @INCOLLECTION{boneh,
1566 author = {Boneh, Dan and Goh, Eu-Jin and Nissim, Kobbi},
1567 title = {Evaluating 2-DNF Formulas on Ciphertexts},
1570 abstract = {Let ψ be a 2-DNF formula on boolean variables x 1,..., x n ∈ {0,1}.
1571 We present a homomorphic public key encryption scheme that allows
1572 the public evaluation of ψ given an encryption of the variables x
1573 1,..., x n. In other words, given the encryption of the bits x 1,...,
1574 x n, anyone can create the encryption of ψ( x 1,..., x n). More generally,
1575 we can evaluate quadratic multi-variate polynomials on ciphertexts
1576 provided the resulting value falls within a small set. We present
1577 a number of applications of the system: 1 In a database of size n,
1578 the total communication in the basic step of the Kushilevitz-Ostrovsky
1579 PIR protocol is reduced from to . 2 An efficient election system
1580 based on homomorphic encryption where voters do not need to include
1581 non-interactive zero knowledge proofs that their ballots are valid.
1582 The election system is proved secure without random oracles but still
1583 efficient. 3 A protocol for universally verifiable computation.},
1584 citeulike-article-id = {2719460},
1585 citeulike-linkout-0 = {http://www.springerlink.com/content/wtt5caxkr94laxkg},
1586 journal = {Theory of Cryptography},
1587 keywords = {homomorphic, pairings},
1588 posted-at = {2008-04-25 21:53:15},
1590 url = {http://www.springerlink.com/content/wtt5caxkr94laxkg}
1594 author = {Bonneau, Richard and Baker, David},
1595 title = {AB INITIO PROTEIN STRUCTURE PREDICTION: Progress and Prospects},
1596 journal = {Annual Review of Biophysics and Biomolecular Structure},
1601 doi = {10.1146/annurev.biophys.30.1.173}
1605 author = {R. Bowen},
1606 title = {Entropy for group endomorphisms and homogeneous spaces},
1607 journal = {Trans. Amer. Math. Soc.},
1612 timestamp = {15/02/2008}
1616 author = {R. Bowen},
1617 title = {Periodic points and measures for Axiom A diffeomorphisms},
1618 journal = {Trans. Amer. Math. Soc.},
1623 timestamp = {15/02/2008}
1626 @ARTICLE{Braxenthaler97,
1627 author = {Michael Braxenthaler and R. Ron Unger and Ditza Auerbach and John
1629 title = {Chaos in protein dynamics},
1630 journal = {Proteins-structure Function and Bioinformatics},
1634 doi = {10.1002/(SICI)1097-0134(199712)29:4<417::AID-PROT2>3.3.CO;2-O},
1638 @INPROCEEDINGS{Brumley03remotetiming,
1639 author = {David Brumley and Dan Boneh},
1640 title = {Remote Timing Attacks are Practical},
1641 booktitle = {Proceedings of the 12th USENIX Security Symposium},
1646 @ARTICLE{Bohm1991375,
1647 author = {Gerald Böhm},
1648 title = {Protein folding and deterministic chaos: Limits of protein folding
1649 simulations and calculations},
1650 journal = {Chaos, Solitons \& Fractals},
1653 pages = {375 - 382},
1655 doi = {DOI: 10.1016/0960-0779(91)90028-8},
1657 url = {http://www.sciencedirect.com/science/article/B6TJ4-46CBXVT-1X/2/370489c218e4c2732cd9b620ef50c696}
1660 @INCOLLECTION{Cachin2004,
1661 author = {Cachin, Christian},
1662 title = {An Information-Theoretic Model for Steganography},
1663 booktitle = {Information Hiding},
1664 publisher = {Springer Berlin / Heidelberg},
1667 series = {Lecture Notes in Computer Science},
1669 affiliation = {MIT Laboratory for Computer Science 545 Technology Square Cambridge
1674 author = {H. Cam and S. Ozdemir and P. Nair and D. Muthuavinashinappan and
1676 title = {ESPDA: Energy-efficient secure pattern based data aggregation for
1677 wireless sensor networks.},
1678 journal = {Computer Communication journal (29)},
1683 @ARTICLE{CarletCZ98,
1684 author = {Claude Carlet and Pascale Charpin and Victor Zinoviev},
1685 title = {Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems},
1686 journal = {Des. Codes Cryptography},
1691 bibsource = {DBLP, http://dblp.uni-trier.de}
1694 @INPROCEEDINGS{Castelluccia05efficientaggregation,
1695 author = {Claude Castelluccia},
1696 title = {Efficient aggregation of encrypted data in wireless sensor networks},
1697 booktitle = {MobiQuitous},
1700 publisher = {IEEE Computer Society}
1704 author = {Cayre, F. and Bas, P.},
1705 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
1706 journal = {IEEE Transactions on Information Forensics and Security},
1711 doi = {10.1109/TIFS.2007.916006},
1713 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
1714 security, watermarking, Kerckhoffs-based embedding security classes,
1715 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
1716 steganography security, watermark-only-attack, watermarking, Security,
1717 spread-spectrum (SS) watermarking},
1719 timestamp = {2009.06.29}
1723 author = {Cayre, F. and Fontaine, C. and Furon, T.},
1724 title = {Watermarking security: theory and practice},
1725 journal = {IEEE Transactions on Signal Processing},
1728 pages = {3976--3987},
1730 doi = {10.1109/TSP.2005.855418},
1732 keywords = {blind source separation, cryptography, watermarking, Fisher information
1733 matrix, blind source separation, cryptanalysis, information theory,
1734 spread spectrum techniques, substitutive scheme, watermarking security,
1735 Blind source separation, Fisher information matrix, equivocation,
1736 security, watermarking},
1738 timestamp = {2009.06.29}
1741 @ARTICLE{Chajakis91,
1742 author = {Chajakis, Emmanuel D. and Zenios, Stavros A.},
1743 title = {Synchronous and asynchronous implementations of relaxation algorithms
1744 for nonlinear network optimization},
1745 journal = {Parallel Comput.},
1750 address = {Amsterdam, The Netherlands, The Netherlands},
1751 doi = {http://dx.doi.org/10.1016/S0167-8191(05)80072-9},
1753 publisher = {Elsevier Science Publishers B. V.}
1757 author = {Chan, Haowen and Perrig, Adrian and Przydatek, Bartosz and Song,
1759 title = {SIA: Secure information aggregation in sensor networks},
1760 journal = {J. Comput. Secur.},
1765 address = {Amsterdam, The Netherlands, The Netherlands},
1767 publisher = {IOS Press}
1770 @ARTICLE{Chandramouli06,
1771 author = {R. Chandramouli and S. Bapatla and K.P. Subbalakshmi},
1772 title = {Battery power-aware encryption},
1773 journal = {ACM transactions on information and system security},
1776 owner = {christophe},
1777 timestamp = {2010.07.31}
1781 author = {Pascale Charpin},
1782 title = {A description of some extended cyclic codes with application to Reed-Solomon
1784 journal = {Discrete Mathematics},
1789 bibsource = {DBLP, http://dblp.uni-trier.de},
1790 ee = {http://dx.doi.org/10.1016/0012-365X(85)90019-6}
1794 author = {D. Chazan and W. Miranker},
1795 title = {Chaotic relaxation},
1796 journal = {Linear algebra and its applications},
1800 timestamp = {2008.05.22}
1804 author = {Cheon, Jung Hee and Kim, Woo-Hwan and Nam, Hyun Soo},
1805 title = {Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy
1806 homomorphism scheme},
1807 journal = {Inf. Process. Lett.},
1812 address = {Amsterdam, The Netherlands, The Netherlands},
1813 doi = {http://dx.doi.org/10.1016/j.ipl.2005.09.016},
1815 publisher = {Elsevier North-Holland, Inc.}
1818 @MISC{Cheon03acryptanalysis,
1819 author = {Jung Hee Cheon and Hyun Soo Nam},
1820 title = {A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy
1826 author = {R.C.C. Cheung and N.J. Telle and W. Luk and P.Y.K. Cheung},
1827 title = {Secure encrypted-data aggregation for wireless sensor networks},
1828 journal = {IEEE Trans. on Very Large Scale Integration Systems},
1831 pages = {1048-1059},
1835 @ARTICLE{Chivian2005,
1836 author = {Chivian, Dylan and Kim, David E. and Malmström, Lars and Schonbrun,
1837 Jack and Rohl, Carol A. and Baker, David},
1838 title = {Prediction of CASP6 structures using automated robetta protocols},
1839 journal = {Proteins},
1845 keywords = {Rosetta, fragment assembly, de novo modeling, homology modeling, parametric
1846 alignment ensemble},
1847 owner = {christophe},
1848 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
1849 timestamp = {2011.01.22},
1850 url = {http://dx.doi.org/10.1002/prot.20733}
1854 author = {Congxu, Zhu and Xuefeng, Liao and Zhihua, Li},
1855 title = {Chaos-based multipurpose image watermarking algorithm},
1856 journal = {Wuhan University Journal of Natural Sciences},
1859 pages = {1675-1678},
1860 note = {10.1007/BF02831848},
1861 abstract = {To achieve the goal of image content authentication and copyright
1862 protection simultaneously, this paper presents a novel image dual
1863 watermarking method based on chaotic map. Firstly, the host image
1864 was split into many nonoverlapping small blocks, and the block-wise
1865 discrete cosine transform (DCT) is computed. Secondly, the robust
1866 watermarks, shuffled by the chaotic sequences, are embedded in the
1867 DC coefficients of blocks to achieve the goal of copyright protection.
1868 The semi-fragile watermarks, generated by chaotic map, are embedded
1869 in the AC coefficients of blocks to obtain the aim of image authentication.
1870 Both of them can be extracted without the original image. Simulation
1871 results demonstrate the effectiveness of our algorithm in terms of
1872 robustness and fragility.},
1873 affiliation = {Central South University School of Information Science and Engineering
1874 410083 Changsha, Hunan China},
1877 keyword = {Mathematics, general},
1878 publisher = {Wuhan University, co-published with Springer},
1879 url = {http://dx.doi.org/10.1007/BF02831848}
1882 @ARTICLE{Conley1978,
1883 author = {C. Conley},
1884 title = {Isolated invariant sets and the Morse index},
1885 journal = {CBMS Regional Conference. AMS.},
1889 timestamp = {2008.01.02}
1893 author = {Philippe Cornu and André Smolarz},
1894 title = {Image characterization by texture},
1895 journal = {Traitement du signal},
1899 file = {:/home/guyeux/Documents/Bibliotheque/These/Watermarking/Caractérisation d'images par textures associées.pdf:PDF},
1901 timestamp = {2008.05.12}
1904 @INPROCEEDINGS{Cox99,
1905 author = {Ingemar Cox and Matt L. Miller and Andrew L. Mckellips},
1906 title = {Watermarking as Communications With Side Information},
1907 booktitle = {Proceedings of the IEEE},
1909 pages = {1127--1141},
1910 owner = {christophe},
1911 timestamp = {2010.03.06}
1914 @ARTICLE{Cox97securespread,
1915 author = {Ingemar J. Cox and Senior Member and Joe Kilian and F. Thomson Leighton
1917 title = {Secure spread spectrum watermarking for multimedia},
1918 journal = {IEEE Transactions on Image Processing},
1921 pages = {1673--1687}
1925 author = {Christopher Cramer and Erol Gelenbe and Hakan Bakircioglu},
1926 title = {Video Compression with Random Neural Networks},
1927 journal = {Neural Networks for Identification, Control, and Robotics, International
1932 address = {Los Alamitos, CA, USA},
1933 isbn = {0-8186-7456-3},
1934 publisher = {IEEE Computer Society}
1937 @INPROCEEDINGS{Crescenzi98,
1938 author = {Crescenzi, Pierluigi and Goldman, Deborah and Papadimitriou, Christos
1939 and Piccolboni, Antonio and Yannakakis, Mihalis},
1940 title = {On the complexity of protein folding (extended abstract)},
1941 booktitle = {Proceedings of the thirtieth annual ACM symposium on Theory of computing},
1943 series = {STOC '98},
1945 address = {New York, NY, USA},
1948 isbn = {0-89791-962-9},
1949 location = {Dallas, Texas, United States},
1954 author = {Zhao Dawei and Chen Guanrong and Liu Wenbo},
1955 title = {A chaos-based robust wavelet-domain watermarking algorithm},
1956 journal = {Chaos, Solitons and Fractals},
1961 timestamp = {2008.10.07}
1965 author = {Anthony Desnos and Robert Erra and Eric Filiol},
1966 title = {Processor-Dependent Malware... and codes},
1968 comment = {arXiv:1011.1638},
1969 eprint = {arXiv:1011.1638}
1973 title = {An Introduction to Chaotic Dynamical Systems},
1974 publisher = {Addison-Wesley},
1976 author = {Devaney, Robert L.},
1977 address = {Redwood City, CA},
1982 author = {Whitfield Diffie and Martin E. Hellman},
1983 title = {New Directions in Cryptography},
1984 journal = {IEEE Transactions on Information Theory},
1989 date = {November 1976},
1991 timestamp = {2009.06.30},
1992 url = {citeseer.ist.psu.edu/diffie76new.html}
1995 @INCOLLECTION{Dijk10,
1996 author = {van Dijk, Marten and Gentry, Craig and Halevi, Shai and Vaikuntanathan,
1998 title = {Fully Homomorphic Encryption over the Integers},
1999 booktitle = {Advances in Cryptology – EUROCRYPT 2010},
2000 publisher = {Springer Berlin / Heidelberg},
2002 editor = {Gilbert, Henri},
2004 series = {Lecture Notes in Computer Science},
2006 abstract = {We construct a simple fully homomorphic encryption scheme, using only
2007 elementary modular arithmetic. We use Gentry’s technique to construct
2008 a fully homomorphic scheme from a bootstrappable somewhat homomorphic
2009 scheme. However, instead of using ideal lattices over a polynomial
2010 ring, our bootstrappable encryption scheme merely uses addition and
2011 multiplication over the integers. The main appeal of our scheme is
2012 the conceptual simplicity. We reduce the security of our scheme to
2013 finding an approximate integer gcd – i.e., given a list of integers
2014 that are near-multiples of a hidden integer, output that hidden integer.
2015 We investigate the hardness of this task, building on earlier work
2016 of Howgrave-Graham.},
2017 affiliation = {MIT CSAIL}
2021 author = {Dill, KA},
2022 title = {Theory for the folding and stability of globular proteins.},
2023 journal = {Biochemistry},
2029 abstract = {Using lattice statistical mechanics, we develop theory to account
2030 for the folding of a heteropolymer molecule such as a protein to
2031 the globular and soluble state. Folding is assumed to be driven by
2032 the association of solvophobic monomers to avoid solvent and opposed
2033 by the chain configurational entropy. Theory predicts a phase transition
2034 as a function of temperature or solvent character. Molecules that
2035 are too short or too long or that have too few solvophobic residues
2036 are predicted not to fold. Globular molecules should have a largely
2037 solvophobic core, but there is an entropic tendency for some residues
2038 to be "out of place", particularly in small molecules. For long chains,
2039 molecules comprised of globular domains are predicted to be thermodynamically
2040 more stable than spherical molecules. The number of accessible conformations
2041 in the globular state is calculated to be an exceedingly small fraction
2042 of the number available to the random coil. Previous estimates of
2043 this number, which have motivated kinetic theories of folding, err
2044 by many tens of orders of magnitude.},
2045 comment = {Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't, P.H.S.,},
2046 keywords = {Mathematics, Models, Chemical, Polymers, Protein Conformation},
2047 owner = {christophe},
2048 timestamp = {2011.01.22},
2049 url = {http://ukpmc.ac.uk/abstract/MED/3986190}
2053 author = {Dill, KA and Bromberg, S and Yue, K and Fiebig, KM and Yee, DP and
2054 Thomas, PD and Chan, HS},
2055 title = {Principles of protein folding--a perspective from simple exact models.},
2056 journal = {Protein Sci},
2059 pages = {561-602--},
2062 abstract = {General principles of protein structure, stability, and folding kinetics
2063 have recently been explored in computer simulations of simple exact
2064 lattice models. These models represent protein chains at a rudimentary
2065 level, but they involve few parameters, approximations, or implicit
2066 biases, and they allow complete explorations of conformational and
2067 sequence spaces. Such simulations have resulted in testable predictions
2068 that are sometimes unanticipated: The folding code is mainly binary
2069 and delocalized throughout the amino acid sequence. The secondary
2070 and tertiary structures of a protein are specified mainly by the
2071 sequence of polar and nonpolar monomers. More specific interactions
2072 may refine the structure, rather than dominate the folding code.
2073 Simple exact models can account for the properties that characterize
2074 protein folding: two-state cooperativity, secondary and tertiary
2075 structures, and multistage folding kinetics--fast hydrophobic collapse
2076 followed by slower annealing. These studies suggest the possibility
2077 of creating "foldable" chain molecules other than proteins. The encoding
2078 of a unique compact chain conformation may not require amino acids;
2079 it may require only the ability to synthesize specific monomer sequences
2080 in which at least one monomer type is solvent-averse.},
2081 address = {Department of Pharmaceutical Chemistry, University of California,
2082 San Francisco 94143-1204, USA.},
2083 comment = {Review,Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't,
2084 Non-P.H.S.,Research Support, U.S. Gov't, P.H.S.,},
2085 keywords = {Amino Acid Sequence, Biological Evolution, Hydrogen Bonding, Models,
2086 Molecular, Molecular Sequence Data, Mutation, Protein Conformation,
2087 Protein Denaturation, Protein Folding, Temperature, Thermodynamics},
2088 owner = {christophe},
2089 timestamp = {2011.01.22},
2090 url = {http://ukpmc.ac.uk/abstract/MED/7613459}
2093 @INPROCEEDINGS{Dobbertin96,
2094 author = {Dobbertin, Hans},
2095 title = {Cryptanalysis of MD4},
2096 booktitle = {Proceedings of the Third International Workshop on Fast Software
2100 address = {London, UK},
2101 publisher = {Springer-Verlag},
2102 isbn = {3-540-60865-6}
2105 @INPROCEEDINGS{DomingoFerrer2002,
2106 author = {Domingo-Ferrer, Josep},
2107 title = {A Provably Secure Additive and Multiplicative Privacy Homomorphism},
2108 booktitle = {ISC '02: Proceedings of the 5th International Conference on Information
2112 address = {London, UK},
2113 publisher = {Springer-Verlag},
2114 isbn = {3-540-44270-7}
2117 @ARTICLE{Dubchak1995,
2118 author = {I. Dubchak and I. Muchnik and S. R. Holbrook and S. H. Kim},
2119 title = {Prediction of protein folding class using global description of amino
2121 journal = {Proc Natl Acad Sci U S A},
2124 pages = {8700--8704},
2127 __markedentry = {[guyeux]},
2128 abstract = {We present a method for predicting protein folding class based on
2129 global protein chain description and a voting process. Selection
2130 of the best descriptors was achieved by a computer-simulated neural
2131 network trained on a data base consisting of 83 folding classes.
2132 Protein-chain descriptors include overall composition, transition,
2133 and distribution of amino acid attributes, such as relative hydrophobicity,
2134 predicted secondary structure, and predicted solvent exposure. Cross-validation
2135 testing was performed on 15 of the largest classes. The test shows
2136 that proteins were assigned to the correct class (correct positive
2137 prediction) with an average accuracy of 71.7\%, whereas the inverse
2138 prediction of proteins as not belonging to a particular class (correct
2139 negative prediction) was 90-95\% accurate. When tested on 254 structures
2140 used in this study, the top two predictions contained the correct
2141 class in 91\% of the cases.},
2142 institution = {Department of Chemistry, University of California, Berkeley 94720,
2144 keywords = {Amino Acid Sequence; Amino Acids, chemistry; Computer Simulation;
2145 Databases, Factual; Models, Chemical; Neural Networks (Computer);
2146 Protein Folding; Protein Structure, Secondary; Proteins, chemistry/classification;
2147 Reproducibility of Results; Solvents},
2149 medline-pst = {ppublish},
2152 timestamp = {2011.07.18}
2156 title = {Real analysis and probability},
2157 publisher = {Cambridge University Press},
2158 author = {Richard M. Dudley},
2161 timestamp = {2008.01.02}
2165 author = {El Tarazi, Mouhamed Nabih},
2166 title = {Algorithmes mixtes asynchrones. Etude de convergence monotone},
2167 journal = {Numerische Mathematik},
2171 note = {10.1007/BF01405568},
2172 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2176 keyword = {Mathematics and Statistics},
2177 publisher = {Springer Berlin / Heidelberg},
2178 url = {http://dx.doi.org/10.1007/BF01405568}
2182 author = {El Tarazi, Mouhamed Nabih},
2183 title = {Some convergence results for asynchronous algorithms},
2184 journal = {Numerische Mathematik},
2188 note = {10.1007/BF01407866},
2189 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2190 Box 5969 Kuwait Kuwait},
2193 keyword = {Mathematics and Statistics},
2194 publisher = {Springer Berlin / Heidelberg},
2195 url = {http://dx.doi.org/10.1007/BF01407866}
2199 author = {Peng Fei and Qiu Shui-Sheng and Long Min},
2200 title = {A secure digital signature algorithm based on elliptic curve and
2202 journal = {Circuits Systems Signal Processing},
2204 volume = {24, No. 5},
2207 timestamp = {2009.01.16}
2210 @BOOK{Feigenbaum1908,
2211 title = {Universal behavior in nonlinear systems},
2212 publisher = {Los Alamos Science},
2214 author = {Feigenbaum},
2216 timestamp = {2008.01.02}
2219 @ARTICLE{Felsenstein1980,
2220 author = {J. Felsenstein},
2221 title = {A view of population genetics.},
2222 journal = {Science},
2228 doi = {10.1126/science.208.4449.1253},
2230 medline-pst = {ppublish},
2232 pii = {208/4449/1253},
2234 timestamp = {2011.05.05},
2235 url = {http://dx.doi.org/10.1126/science.208.4449.1253}
2239 title = {Les virus informatiques : techniques virales et antivirales avancées},
2241 editor = {Springer},
2242 author = {Eric Filiol},
2243 owner = {christophe},
2244 timestamp = {2010.10.13}
2247 @INPROCEEDINGS{FiliolBlackHat,
2248 author = {Eric Filiol},
2249 title = {Passive and Active Leakage of Secret Data from Non Networked Computer},
2250 booktitle = {Black Hat},
2252 owner = {christophe},
2253 timestamp = {2010.11.28}
2256 @PHDTHESIS{Formenti2003,
2257 author = {Enrico Formenti},
2258 title = {De l'algorithmique du chaos dans les systèmes dynamiques discrets},
2259 school = {Université de Provence},
2262 timestamp = {2008.01.02}
2265 @PHDTHESIS{Formenti1998,
2266 author = {Enrico Formenti},
2267 title = {Automates cellulaires et chaos : de la vision topologique à la vision
2269 school = {\'Ecole Normale Supérieure de Lyon},
2271 optmonth = {Octobre},
2273 timestamp = {2008.01.02}
2277 author = {Gabriel Frey and Christian J Michel},
2278 title = {Identification of circular codes in bacterial genomes and their use
2279 in a factorization method for retrieving the reading frames of genes.},
2280 journal = {Comput Biol Chem},
2286 abstract = {We developed a statistical method that allows each trinucleotide to
2287 be associated with a unique frame among the three possible ones in
2288 a (protein coding) gene. An extensive gene study in 175 complete
2289 bacterial genomes based on this statistical approach resulted in
2290 identification of 72 new circular codes. Finding a circular code
2291 enables an immediate retrieval of the reading frame locally anywhere
2292 in a gene. No knowledge of location of the start codon is required
2293 and a short window of only a few nucleotides is sufficient for automatic
2294 retrieval. We have therefore developed a factorization method (that
2295 explores previously found circular codes) for retrieving the reading
2296 frames of bacterial genes. Its principle is new and easy to understand.
2297 Neither complex treatment nor specific information on the nucleotide
2298 sequences is necessary. Moreover, the method can be used for short
2299 regions in nucleotide sequences (less than 25 nucleotides in protein
2300 coding genes). Selected additional properties of circular codes and
2301 their possible biological consequences are also discussed.},
2302 doi = {10.1016/j.compbiolchem.2005.11.001},
2303 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2304 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2305 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2306 keywords = {Base Sequence; Computational Biology; Genes, Bacterial; Genome, Bacterial;
2307 Genomics, statistics /&/ numerical data; Models, Genetic; Models,
2308 Statistical; Reading Frames},
2310 medline-pst = {ppublish},
2312 pii = {S1476-9271(05)00111-8},
2314 timestamp = {2011.05.05},
2315 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.11.001}
2319 author = {Gabriel Frey and Christian J Michel},
2320 title = {An analytical model of gene evolution with six mutation parameters:
2321 an application to archaeal circular codes.},
2322 journal = {Comput Biol Chem},
2328 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
2329 mutation matrix 64 x 64 with six substitution parameters associated
2330 with the transitions and transversions in the three trinucleotide
2331 sites. It generalizes the previous models based on the nucleotide
2332 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
2333 x 64 with three parameters. It determines at some time t the exact
2334 occurrence probabilities of trinucleotides mutating randomly according
2335 to six substitution parameters. An application of this model allows
2336 an evolutionary study of the common circular code COM and the 15
2337 archaeal circular codes X which have been recently identified in
2338 several archaeal genomes. The main property of a circular code is
2339 the retrieval of the reading frames in genes, both locally, i.e.
2340 anywhere in genes and in particular without a start codon, and automatically
2341 with a window of a few nucleotides. In genes, the circular code is
2342 superimposed on the traditional genetic one. Very unexpectedly, the
2343 evolutionary model demonstrates that the archaeal circular codes
2344 can derive from the common circular code subjected to random substitutions
2345 with particular values for six substitutions parameters. It has a
2346 strong correlation with the statistical observations of three archaeal
2347 codes in actual genes. Furthermore, the properties of these substitution
2348 rates allow proposal of an evolutionary classification of the 15
2349 archaeal codes into three main classes according to this model. In
2350 almost all the cases, they agree with the actual degeneracy of the
2351 genetic code with substitutions more frequent in the third trinucleotide
2352 site and with transitions more frequent that transversions in any
2353 trinucleotide site.},
2354 doi = {10.1016/j.compbiolchem.2005.09.001},
2355 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2356 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2357 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2358 keywords = {Archaea, genetics; DNA, Circular; Evolution, Molecular; Genetic Code;
2359 Genome, Archaeal; Models, Genetic; Mutation; Trinucleotide Repeats},
2361 medline-pst = {ppublish},
2363 pii = {S1476-9271(05)00083-6},
2365 timestamp = {2011.05.05},
2366 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.09.001}
2369 @INPROCEEDINGS{fgb11:ip,
2370 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
2371 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
2372 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography},
2375 address = {Sevilla, Spain},
2378 classement = {ACTI},
2379 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2385 author = {Alain Frisch},
2386 title = {Entropie topologique et définition du chaos},
2388 note = {Rapport de tipe},
2389 file = {Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:Chaos/Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:PDF},
2390 keywords = {Chaos, Entropie Topologique, Tipe},
2392 timestamp = {2008.01.02},
2393 url = {http://alain.frisch.fr/math.html}
2397 author = {Alain Frisch},
2398 title = {Entropie topologique et définition du chaos},
2400 note = {[En ligne; Page disponible le 12-août-2010]},
2401 url = {\url{http://alain.frisch.fr/math.html}}
2404 @ARTICLE{Frommer97asynchronousweighted,
2405 author = {Andreas Frommer and Hartmut Schwandt and Daniel and Daniel B. Szyld},
2406 title = {Asynchronous Weighted Additive Schwarz Methods},
2407 journal = {Electronic Transactions on Numerical Analysis},
2413 @MISC{Frommer94asynchronoustwo-stage,
2414 author = {Andreas Frommer and Daniel B. Szyld},
2415 title = {Asynchronous Two-Stage Iterative Methods},
2420 title = {Introduction to Chaos and Coherence},
2421 publisher = {IOP Publishing},
2423 author = {J. Frøyland},
2425 timestamp = {2008.01.02}
2429 author = {T. Furon},
2430 title = {Security analysis},
2432 note = {European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5},
2434 timestamp = {2009.06.30}
2438 author = {Furon, Teddy and Bas, Patrick},
2439 title = {Broken arrows},
2440 journal = {EURASIP J. Inf. Secur.},
2444 address = {New York, NY, United States},
2445 doi = {http://dx.doi.org/10.1155/2008/597040},
2447 owner = {christophe},
2448 publisher = {Hindawi Publishing Corp.},
2449 timestamp = {2010.03.06}
2452 @ARTICLE{P1150442004,
2453 author = {G.S.El-Taweel and H.M. Onsi and M.Samy and M.G. Darwish},
2454 title = {Secure and Non-Blind Watermarking Scheme for Color Images Based on
2456 journal = {ICGST International Journal on Graphics, Vision and Image Processing},
2462 owner = {christophe},
2463 timestamp = {2010.03.07}
2466 @INPROCEEDINGS{Gentry09,
2467 author = {Gentry, Craig},
2468 title = {Fully homomorphic encryption using ideal lattices},
2469 booktitle = {STOC '09: Proceedings of the 41st annual ACM symposium on Theory
2473 address = {New York, NY, USA},
2475 doi = {http://doi.acm.org/10.1145/1536414.1536440},
2476 isbn = {978-1-60558-506-2},
2477 location = {Bethesda, MD, USA}
2480 @INPROCEEDINGS{Girao04,
2481 author = {J. Girao and M. Schneider and D. Westhoff},
2482 title = {CDA: Concealed data aggregation in wireless sensor networks},
2483 booktitle = {Proceedings of the ACM Workshop on Wireless Security},
2485 owner = {christophe},
2486 timestamp = {2010.07.31}
2489 @CONFERENCE{Gotsman88,
2490 author = {C. Gotsman and D. Lehmann and E. Shamir},
2491 title = {Asynchronous Dynamics of Random Boolean Networks},
2492 booktitle = {San Diego '88 Neural Networks Conference},
2495 timestamp = {30/03/2008}
2498 @ARTICLE{Guckenheimer1979,
2499 author = {J. Guckenheimer},
2500 title = {Sensitive dependence to initial conditions for one-dimensional maps},
2501 journal = {Comm. Math. Phys.},
2503 optpages = {133-160},
2505 timestamp = {2008.01.02}
2509 title = {Nonlinear oscillations, dynamical systems, and bifurcations of vector
2511 publisher = {Springer Verlag},
2513 author = {J. Guckenheimer and P. Holmes},
2515 timestamp = {2008.01.02}
2518 @ARTICLE{Guo20093201,
2519 author = {Wei Guo and Xiaoming Wang and Dake He and Yang Cao},
2520 title = {Cryptanalysis on a parallel keyed hash function based on chaotic
2522 journal = {Physics Letters A},
2525 pages = {3201 - 3206},
2527 abstract = {This Letter analyzes the security of a novel parallel keyed hash function
2528 based on chaotic maps, proposed by Xiao et al. to improve the efficiency
2529 in parallel computing environment. We show how to devise forgery
2530 attacks on Xiao's scheme with differential cryptanalysis and give
2531 the experiment results of two kinds of forgery attacks firstly. Furthermore,
2532 we discuss the problem of weak keys in the scheme and demonstrate
2533 how to utilize weak keys to construct collision.},
2535 keywords = {Cryptanalysis}
2538 @PHDTHESIS{GuyeuxThese10,
2539 author = {Christophe Guyeux},
2540 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
2541 en s\'{e}curit\'{e} informatique},
2542 school = {Universit\'{e} de Franche-Comt\'{e}},
2544 owner = {christophe},
2545 timestamp = {2010.12.21}
2549 author = {Guyeux, Christophe and Bahi, Jacques},
2550 title = {\'Etude topologique de l'\'etalement de spectre},
2551 howpublished = {Journ\'ees Codes et St\'eganographie, \'Ecoles Militaires de Saint-Cyr,
2556 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2561 @INPROCEEDINGS{bg10:ip,
2562 author = {Guyeux, Christophe and Bahi, Jacques},
2563 title = {An improved watermarking algorithm for Internet applications},
2564 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
2567 address = {Valencia, Spain},
2569 classement = {ACTI},
2570 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2575 @INPROCEEDINGS{gfb10:ip,
2576 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques},
2577 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
2578 booktitle = {IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and
2579 Multimedia Signal Processing},
2582 address = {Darmstadt, Germany},
2584 classement = {ACTI},
2585 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2591 author = {Christophe Guyeux and Nicolas Friot and Jacques M. Bahi},
2592 title = {A more secure information hiding scheme than spread-spectrum obtained
2594 journal = {arXiv 0032565},
2597 timestamp = {2010.04.30}
2601 title = {Guide to Elliptic Curve Cryptography},
2602 publisher = {Springer Professional Computing},
2604 editor = {Springer},
2605 author = {D. Hankerson and A. Menezes and S. Vanstone},
2606 owner = {christophe},
2607 timestamp = {2010.07.31}
2610 @ARTICLE{Hasegawa1985,
2611 author = {M. Hasegawa and H. Kishino and T. Yano},
2612 title = {Dating of the human-ape splitting by a molecular clock of mitochondrial
2614 journal = {J Mol Evol},
2619 abstract = {A new statistical method for estimating divergence dates of species
2620 from DNA sequence data by a molecular clock approach is developed.
2621 This method takes into account effectively the information contained
2622 in a set of DNA sequence data. The molecular clock of mitochondrial
2623 DNA (mtDNA) was calibrated by setting the date of divergence between
2624 primates and ungulates at the Cretaceous-Tertiary boundary (65 million
2625 years ago), when the extinction of dinosaurs occurred. A generalized
2626 least-squares method was applied in fitting a model to mtDNA sequence
2627 data, and the clock gave dates of 92.3 +/- 11.7, 13.3 +/- 1.5, 10.9
2628 +/- 1.2, 3.7 +/- 0.6, and 2.7 +/- 0.6 million years ago (where the
2629 second of each pair of numbers is the standard deviation) for the
2630 separation of mouse, gibbon, orangutan, gorilla, and chimpanzee,
2631 respectively, from the line leading to humans. Although there is
2632 some uncertainty in the clock, this dating may pose a problem for
2633 the widely believed hypothesis that the pipedal creature Australopithecus
2634 afarensis, which lived some 3.7 million years ago at Laetoli in Tanzania
2635 and at Hadar in Ethiopia, was ancestral to man and evolved after
2636 the human-ape splitting. Another likelier possibility is that mtDNA
2637 was transferred through hybridization between a proto-human and a
2638 proto-chimpanzee after the former had developed bipedalism.},
2639 keywords = {Animals; Biological Evolution; DNA, Mitochondrial, genetics; Genes;
2640 Haplorhini, genetics; Humans; Mathematics; Models, Genetic; Nucleic
2641 Acid Hybridization; Primates, genetics; Proteins, genetics; Species
2644 medline-pst = {ppublish},
2647 timestamp = {2011.05.05}
2651 title = {A First Course in Discrete Dynamical Systems},
2652 publisher = {Springer-Verlag},
2654 author = {R. Homlgren},
2657 timestamp = {2008.01.02}
2660 @INCOLLECTION{Hoque09,
2661 author = {Hoque, Md. and Chetty, Madhu and Sattar, Abdul},
2662 title = {Genetic Algorithm in Ab Initio Protein Structure Prediction Using
2663 Low Resolution Model: A Review},
2664 booktitle = {Biomedical Data and Applications},
2665 publisher = {Springer Berlin Heidelberg},
2667 editor = {Sidhu, Amandeep and Dillon, Tharam},
2669 series = {Studies in Computational Intelligence},
2671 affiliation = {IIIS, Griffith University, Nathan, QLD-4111 Australia}
2674 @CONFERENCE{Houmansadr09,
2675 author = {A. Houmansadr and N. Kiyavash and N. Borisov},
2676 title = {Rainbow: A robust and invisible non-blind watermark for network flows},
2677 booktitle = {NDSS’09: 16th Annual Network and Distributed System Security Symposium},
2679 owner = {christophe},
2680 timestamp = {2010.03.07}
2684 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J.},
2685 title = {Secure encrypted-data aggregation for wireless sensor networks},
2686 journal = {Wireless Networks},
2687 abstract = {Abstract\ \ This paper proposes a secure encrypted-data
2688 aggregation scheme for wireless sensor networks. Our design for data
2689 aggregation eliminates redundant sensor readings without using encryption
2690 and maintains data secrecy and privacy during transmission. Conventional
2691 aggregation functions operate when readings are received in plaintext.
2692 If readings are encrypted, aggregation requires decryption creating
2693 extra overhead and key management issues. In contrast to conventional
2694 schemes, our proposed scheme provides security and privacy, and duplicate
2695 instances of original readings will be aggregated into a single packet.
2696 Our scheme is resilient to known-plaintext attacks, chosen-plaintext
2697 attacks, ciphertext-only attacks and man-in-the-middle attacks. Our
2698 experiments show that our proposed aggregation method significantly
2699 reduces communication overhead and can be practically implemented
2700 in on-the-shelf sensor platforms.},
2701 citeulike-article-id = {4499496},
2702 citeulike-linkout-0 = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2703 citeulike-linkout-1 = {http://www.springerlink.com/content/g573138072642u63},
2704 doi = {10.1007/s11276-009-0177-y},
2705 posted-at = {2009-05-10 09:55:44},
2706 url = {http://dx.doi.org/10.1007/s11276-009-0177-y}
2710 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J. D.},
2711 title = {Secure encrypted-data aggregation for wireless sensor networks},
2712 journal = {Wirel. Netw.},
2717 address = {Hingham, MA, USA},
2718 doi = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2720 publisher = {Kluwer Academic Publishers}
2724 author = {W. Huang and X. Ye},
2725 title = {Homeomorphisms with the whole compacta being scrambled sets},
2726 journal = {Ergod. Th. Dynam. Systems},
2732 timestamp = {2008.01.02}
2735 @ARTICLE{Hurley1982,
2736 author = {M. Hurley},
2737 title = {Attractors, persistence and density of their bassin},
2738 journal = {Transactions of AMS},
2740 optpages = {247-271},
2743 timestamp = {2008.01.02}
2746 @INPROCEEDINGS{Islam:2009:NMA:1695134.1695181,
2747 author = {Islam, Md. Kamrul and Chetty, Madhu},
2748 title = {Novel Memetic Algorithm for Protein Structure Prediction},
2749 booktitle = {Proceedings of the 22nd Australasian Joint Conference on Advances
2750 in Artificial Intelligence},
2754 address = {Berlin, Heidelberg},
2755 publisher = {Springer-Verlag},
2757 isbn = {978-3-642-10438-1},
2758 keywords = {Guided search space, Memetic Algorithm, Modified fitness function,
2759 Pair-wise-interchange, Schema preservation, Tabu Search},
2760 location = {Melbourne, Australia},
2764 @PHDTHESIS{Jacquemard77,
2765 author = {C. Jacquemard},
2766 title = {Contribution à l'étude d'algorithmes à convergence monotone},
2767 school = {Université de Franche-Comté},
2769 owner = {christophe},
2770 timestamp = {2010.08.25}
2774 title = {{Evolution of Protein Molecules}},
2775 publisher = {Academy Press},
2777 editor = {Munro, H. N.},
2778 author = {Jukes, T. H. and Cantor, C. R.},
2779 booktitle = {Evolution of Protein Molecules},
2780 citeulike-article-id = {1673661},
2781 keywords = {compbio, fresco},
2782 posted-at = {2007-09-19 06:23:18},
2786 @INPROCEEDINGS{Kalker2001,
2787 author = {Kalker, T.},
2788 title = {Considerations on watermarking security},
2791 abstract = {In this paper we address the usually implicit assumption that digital
2792 watermarking has as its main target copyright and copy protection
2793 applications. From these target applications a great many conclusions
2794 are drawn about the required security of a watermarking system, and
2795 in fact, a considerably percentage of the watermarking literature
2796 has this very topic as its main focus of attention. In this paper
2797 we take a step back, and try to do a more careful analysis of the
2798 'watermarking-is-for-security-applications' paradigm. The intention
2799 of this paper is to discuss the meaning of the concept security in
2800 the context of watermarking, and try to show that one has to be careful
2801 in using analogies from the related field of cryptography},
2802 citeulike-article-id = {1226513},
2803 journal = {2001 IEEE Fourth Workshop on Multimedia Signal Processing},
2804 keywords = {security, wateramarking},
2806 posted-at = {2007-04-14 14:30:06},
2808 timestamp = {2009.06.30}
2811 @ARTICLE{Kerckhoffs83,
2812 author = {Kerckhoffs, Auguste},
2813 title = {La cryptographie militaire},
2814 journal = {Journal des sciences militaires},
2819 abstract = {pp. 161–191, Feb. 1883.},
2820 citeulike-article-id = {505508},
2821 keywords = {cryptography, master},
2823 posted-at = {2006-02-15 04:49:15},
2825 timestamp = {2009.06.30}
2829 author = {Kimura, Motoo},
2830 title = {A simple method for estimating evolutionary rates of base substitutions
2831 through comparative studies of nucleotide sequences},
2832 journal = {Journal of Molecular Evolution},
2836 note = {10.1007/BF01731581},
2837 affiliation = {National Institute of Genetics 411 Mishima Japan},
2840 keyword = {Biomedical and Life Sciences},
2841 publisher = {Springer New York},
2842 url = {http://dx.doi.org/10.1007/BF01731581}
2847 title = {Chaos Without Nonperiodicity},
2848 journal = {Amer. Math. Monthly},
2852 timestamp = {27/01/2008}
2855 @PHDTHESIS{Knudsen1994a,
2856 author = {C. Knudsen},
2857 title = {Aspects of noninvertible dynamics and chaos},
2858 school = {Technical University of Denmark},
2861 timestamp = {2008.01.02}
2865 author = {L. Kocarev and J. Szczepanski and J.M. Amigo and I. Tomovski},
2866 title = {Discrete Chaos - I: Theory},
2867 journal = {IEEE Trans. on Circuits Systems},
2870 pages = {1300-1309},
2871 owner = {christophe},
2872 timestamp = {2010.10.10}
2875 @INPROCEEDINGS{Kocher95cryptanalysisof,
2876 author = {Paul C. Kocher},
2877 title = {Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using
2878 Timing Attacks (Extended Abstract)},
2879 booktitle = {Advances in Cryptology, CRYPTO '95: 15th Annual International Cryptology
2883 publisher = {Springer-Verlag}
2886 @ARTICLE{Kullback1951,
2887 author = {Kullback, Solomon and Leibler, Richard A.},
2888 title = {On Information and Sufficiency},
2889 journal = {The Annals of Mathematical Statistics},
2894 citeulike-article-id = {3245942},
2895 keywords = {file-import-08-09-12},
2897 posted-at = {2008-09-12 14:30:37},
2899 timestamp = {2009.06.29}
2903 author = {Eshter Ledoux},
2904 title = {Introduction à la théorie du chaos},
2906 note = {[En ligne; Page disponible le 12-août-2010]},
2907 url = {\url{http://www.nux.be/eledoux/mem/node1.html}}
2911 title = {Analyse en dimension finie},
2912 publisher = {Masson},
2918 timestamp = {2008.01.02}
2922 author = {A.K. Lenstra and E.R. Verheul},
2923 title = {Selecting Cryptographic Key Sizes},
2924 journal = {Jour. of the International Association for Cryptologic Research},
2932 author = {Lettvin, J.Y. and Maturana, H.R. and McCulloch, W.S. and Pitts, W.H.},
2933 title = {What the Frog's Eye Tells the Frog's Brain},
2934 journal = {Proceedings of the IRE},
2939 owner = {christophe},
2940 timestamp = {2010.12.21}
2944 author = {T. Y. Li and J. A. Yorke},
2945 title = {Period three implies chaos},
2946 journal = {Amer. Math. Monthly},
2952 timestamp = {27/01/2008}
2956 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2957 title = {A novel Hash algorithm construction based on chaotic neural network},
2958 journal = {Neural Computing and Applications},
2961 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2964 keyword = {Computer Science},
2965 publisher = {Springer London}
2968 @INPROCEEDINGS{Lin09,
2969 author = {Lin, Hua-Yi and Chiang, Tzu-Chiang},
2970 title = {Cooperative secure data aggregation in sensor networks using elliptic
2971 curve based cryptosystems},
2972 booktitle = {CDVE'09: Proceedings of the 6th international conference on Cooperative
2973 design, visualization, and engineering},
2976 address = {Berlin, Heidelberg},
2977 publisher = {Springer-Verlag},
2978 isbn = {3-642-04264-3, 978-3-642-04264-5},
2979 location = {Luxembourg, Luxembourg}
2982 @INPROCEEDINGS{Liu2008,
2983 author = {Liu, An and Ning, Peng},
2984 title = {TinyECC: A Configurable Library for Elliptic Curve Cryptography in
2985 Wireless Sensor Networks},
2986 booktitle = {7th International Conference on Information Processing in Sensor
2987 Networks (IPSN 2008)},
2991 citeulike-article-id = {3041699},
2992 howpublished = {SPOTS Track},
2994 posted-at = {2008-07-25 05:25:05},
2998 @ARTICLE{Liu2007bis,
2999 author = {Shao-Hui Liu and Hong-Xun Yao and Wen Gao and Yong-Liang Liu},
3000 title = {An image fragile watermark scheme based on chaotic image pattern
3002 journal = {Applied Mathematics and Computation},
3007 timestamp = {2008.10.07}
3010 @INPROCEEDINGS{Liu07,
3011 author = {Liu, Zhen and Xi, Lifeng},
3012 title = {Image Information Hiding Encryption Using Chaotic Sequence},
3013 booktitle = {KES '07: Knowledge-Based Intelligent Information and Engineering
3014 Systems and the XVII Italian Workshop on Neural Networks on Proceedings
3015 of the 11th International Conference},
3018 address = {Berlin, Heidelberg},
3019 publisher = {Springer-Verlag},
3020 doi = {http://dx.doi.org/10.1007/978-3-540-74827-4_26},
3021 isbn = {978-3-540-74826-7},
3022 location = {Vietri sul Mare, Italy}
3026 author = {Zhen Liu and Lifeng Xi},
3027 title = {Image Information Hiding Encryption Using Chaotic Sequence},
3033 timestamp = {11/04/2008}
3036 @ARTICLE{Lubachevsky86,
3037 author = {Lubachevsky, Boris and Mitra, Debasis},
3038 title = {A chaotic asynchronous algorithm for computing the fixed point of
3039 a nonnegative matrix of unit spectral radius},
3045 address = {New York, NY, USA},
3046 doi = {http://doi.acm.org/10.1145/4904.4801},
3052 author = {{L}arger, {L}. and {D}udley, {J}.{M}.},
3053 title = { {N}onlinear dynamics {O}ptoelectronic chaos},
3054 journal = {{N}ature },
3060 abstract = {{O}ptoelectronic circuits with delayed feedback provide a convenient
3061 bench-top platform to study a wide range of nonlinear dynamic systems,
3062 from ultrastable clocks to complex chaotic devices.},
3063 affiliation = {{F}ranche-{C}omt{\'e} {\'E}lectronique {M}{\'e}canique, {T}hermique
3064 et {O}ptique - {S}ciences et {T}echnologies - {FEMTO}-{ST} - {CNRS}
3065 : {UMR}6174 - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {U}niversit{\'e}
3066 de {T}echnologie de {B}elfort-{M}ontbeliard - {E}cole {N}ationale
3067 {S}up{\'e}rieure de {M}{\'e}canique et des {M}icrotechniques },
3068 audience = {internationale },
3070 doi = {10.1038/465041a },
3071 hal_id = {hal-00517696},
3072 language = {{A}nglais},
3073 url = {http://hal.archives-ouvertes.fr/hal-00517696/en/}
3076 @INPROCEEDINGS{Mahoney00,
3077 author = {Mahoney, Matthew V.},
3078 title = {Fast Text Compression with Neural Networks},
3079 booktitle = {Proceedings of the Thirteenth International Florida Artificial Intelligence
3080 Research Society Conference},
3083 publisher = {AAAI Press},
3085 isbn = {1-57735-113-4},
3089 @INPROCEEDINGS{msp10:bl,
3090 author = {Makhoul, Abdallah and Saadi, Rachid and Pham, Congduc},
3091 title = {Risk Management in Intrusion Detection Applications with Wireless
3092 Video Sensor Networks},
3093 booktitle = {WCNC'10 IEEE Int. Conf.},
3096 address = {Sydney, Australia},
3105 author = {H.S. Malvar and D. Florêncio},
3106 title = {Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking},
3107 journal = {IEEE Trans. Signal Proceeding},
3111 owner = {christophe},
3112 timestamp = {2010.03.07}
3115 @ARTICLE{Marsaglia2003,
3116 author = {G. Marsaglia},
3117 title = {Xorshift RNGs},
3118 journal = {Journal of Statistical Software},
3123 timestamp = {2009.10.28}
3126 @ARTICLE{Marsaglia1996,
3127 author = {G. Marsaglia},
3128 title = {DIEHARD: a battery of tests of randomness.},
3129 journal = {http://stat.fsu.edu/~geo/diehard.html},
3132 timestamp = {2009.11.09}
3135 @ARTICLE{Simard07testu01:a,
3136 author = {Richard Simard and Université De Montréal},
3137 title = {TestU01: A C library for empirical testing of random number generators},
3138 journal = {ACM Transactions on Mathematical Software},
3143 @ARTICLE{DefiningChaos,
3144 author = {M. Martelli and M. Dang and T. Seph},
3145 title = {Defining chaos},
3146 journal = {Mathematics Magazine},
3150 owner = {christophe},
3151 timestamp = {2010.08.11}
3154 @ARTICLE{Michel2007c,
3155 author = {Christian J Michel},
3156 title = {An analytical model of gene evolution with 9 mutation parameters:
3157 an application to the amino acids coded by the common circular code.},
3158 journal = {Bull Math Biol},
3164 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
3165 mutation matrix 64 x 64 with nine substitution parameters associated
3166 with the three types of substitutions in the three trinucleotide
3167 sites. It generalizes the previous models based on the nucleotide
3168 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
3169 x 64 with three and six parameters. It determines at some time t
3170 the exact occurrence probabilities of trinucleotides mutating randomly
3171 according to these nine substitution parameters. An application of
3172 this model allows an evolutionary study of the common circular code
3173 [Formula: see text] of eukaryotes and prokaryotes and its 12 coded
3174 amino acids. The main property of this code [Formula: see text] is
3175 the retrieval of the reading frames in genes, both locally, i.e.
3176 anywhere in genes and in particular without a start codon, and automatically
3177 with a window of a few nucleotides. However, since its identification
3178 in 1996, amino acid information coded by [Formula: see text] has
3179 never been studied. Very unexpectedly, this evolutionary model demonstrates
3180 that random substitutions in this code [Formula: see text] and with
3181 particular values for the nine substitutions parameters retrieve
3182 after a certain time of evolution a frequency distribution of these
3183 12 amino acids very close to the one coded by the actual genes.},
3184 doi = {10.1007/s11538-006-9147-z},
3185 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
3186 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
3187 67400 Illkirch, France. michel@dpt-info.u-strasbg.fr},
3188 keywords = {Amino Acids, genetics; Codon, genetics; Eukaryotic Cells; Evolution,
3189 Molecular; Models, Genetic; Prokaryotic Cells},
3191 medline-pst = {ppublish},
3194 timestamp = {2011.05.05},
3195 url = {http://dx.doi.org/10.1007/s11538-006-9147-z}
3199 author = {J.-C. Miellou},
3200 title = {Algorithmes de relaxation chaotique \`{a} retards},
3206 timestamp = {2008.05.22}
3209 @ARTICLE{Miellou75b,
3210 author = {Miellou, J.-C.},
3211 title = {Itérations chaotiques à retards, étude de la convergence dans le
3212 cas d'espaces partiellement ordonnés},
3213 journal = {C.R.A.S. Paris},
3217 owner = {christophe},
3218 timestamp = {2010.08.17}
3222 author = {Jean-Claude Miellou and Pierre Spitéri},
3223 title = {Un critère de convergence pour des méthodes générales de point fixe},
3224 journal = {Rairo -- Modélisation mathématique et analyse numérique},
3229 owner = {christophe},
3230 timestamp = {2010.10.13}
3234 author = {Aidan Mooney and John G. Keating and Ioannis Pitas},
3235 title = {A comparative study of chaotic and white noise signals in digital
3237 journal = {Chaos, Solitons and Fractals},
3241 owner = {christophe},
3242 timestamp = {2010.03.01}
3245 @ARTICLE{Nakashima2003,
3246 author = {Nakashima, Y. and Tachibana, R. and Babaguchi, N.},
3247 title = {Watermarked Movie Soundtrack Finds the Position of the Camcorder
3249 journal = {IEEE Transactions on Multimedia},
3251 note = {Accepted for future publication Multimedia}
3254 @INCOLLECTION{springerlink:10.1007/978-3-642-04431-1_16,
3255 author = {Nelson, Michael and Nahapetian, Ani and Koushanfar, Farinaz and Potkonjak,
3257 title = {SVD-Based Ghost Circuitry Detection},
3258 booktitle = {Information Hiding},
3259 publisher = {Springer Berlin / Heidelberg},
3261 editor = {Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza},
3263 series = {Lecture Notes in Computer Science},
3265 note = {10.1007/978-3-642-04431-1_16},
3266 affiliation = {Computer Science Department, UCLA, Los Angeles, CA 90095, USA},
3267 url = {http://dx.doi.org/10.1007/978-3-642-04431-1_16}
3270 @INPROCEEDINGS{Perez-Hernandez09,
3271 author = {P\'{e}rez-Hern\'{a}ndez, Luis Germ\'{a}n and Rodr\'{\i}guez-V\'{a}zquez,
3272 Katya and Gardu\~{n}o-Ju\'{a}rez, Ram\'{o}n},
3273 title = {Parallel particle swarm optimization applied to the protein folding
3275 booktitle = {Proceedings of the 11th Annual conference on Genetic and evolutionary
3278 series = {GECCO '09},
3279 pages = {1791--1792},
3280 address = {New York, NY, USA},
3283 isbn = {978-1-60558-325-9},
3284 keywords = {bioinformatics, biology and chemistry, combinatorial optimization,
3285 parallelization, swarm intelligence},
3286 location = {Montreal, Qu\&\#233;bec, Canada},
3290 @PHDTHESIS{Pellegrin1986,
3291 author = {D. Pellegrin},
3292 title = {Algorithmique discr\`{e}te et r\'{e}seaux d'automates},
3293 school = {Grenoble},
3296 timestamp = {2008.05.22}
3300 author = {F. Peng and S.-S. Qiu and M. Long},
3301 title = {One way Hash function construction based on two-dimensional hyperchaotic
3303 journal = {Acta Phys. Sinici.},
3308 timestamp = {2009.01.16}
3311 @INPROCEEDINGS{Perez06,
3312 author = {Luis Perez-Freire and F. Pérez-gonzalez and Pedro Comesaña},
3313 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
3315 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents},
3317 editor = {Edward J. Delp and Ping W. Wong},
3318 address = {San Jose, California, USA},
3320 organization = {SPIE},
3322 timestamp = {2009.06.30}
3325 @INPROCEEDINGS{Perez-Freire06,
3326 author = {Luis Perez-Freire and Pedro Comesana and Juan Ramon Troncoso-Pastoriza
3327 and Fernando Perez-Gonzalez},
3328 title = {Watermarking Security: a Survey},
3329 booktitle = {LNCS Transactions on Data Hiding and Multimedia Security},
3332 timestamp = {2009.06.29}
3335 @PROCEEDINGS{Peter07,
3336 title = {On Concealed Data Aggregation for WSNs},
3338 author = {Peter, Steffen and Piotrowski, Krzysztof and Langendoerfer, Peter},
3339 booktitle = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3341 citeulike-article-id = {2281643},
3342 citeulike-linkout-0 = {http://dx.doi.org/10.1109/CCNC.2007.45},
3343 citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4199133},
3344 doi = {10.1109/CCNC.2007.45},
3345 journal = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3349 posted-at = {2008-01-23 19:36:19},
3351 url = {http://dx.doi.org/10.1109/CCNC.2007.45}
3355 author = {Pham, Congduc and Makhoul, Abdallah and Saadi, Rachid},
3356 title = {Risk-based Adaptive Scheduling in Randomly Deployed Video Sensor
3357 Networks for Critical Surveillance Applications},
3358 journal = {Journal of Network and Computer Applications},
3363 note = {Accepted manuscript. To appear},
3364 classement = {ACLI},
3366 impact-factor = {1.111},
3368 isi-acro = {J NETW COMPU APPL},
3369 publisher = {Springer}
3373 author = {Edgar Alan Poe},
3374 title = {The Raven},
3377 note = {American Museum (Baltimore)},
3378 owner = {christophe},
3379 timestamp = {2010.11.23}
3382 @ARTICLE{Perez-Freire2006:Security,
3383 author = {L. P{\'e}rez-Freire and F. P{\'e}rez-González and T. Furon and P.
3385 title = {Security of lattice-based data hiding against the known message attack},
3386 journal = {IEEE Trans. on Information Forensics and Security},
3393 timestamp = {2009.12.06}
3396 @MISC{Quisquater02sidechannel,
3397 author = {J-J. Quisquater and D. Samyde and Université Catholique De Louvain
3399 title = {Side Channel Cryptanalysis},
3403 @ARTICLE{Raynal2001,
3404 author = {Frédéric Raynal and Fabien A. P. Petitcolas and Caroline Fontaine},
3405 title = {Evaluation automatique des méthodes de tatouage},
3406 journal = {Traitement du signal},
3411 timestamp = {2008.05.21}
3415 author = {Vincent Rijmen and Elisabeth Oswald},
3416 title = {Update on SHA-1},
3417 howpublished = {Cryptology ePrint Archive, Report 2005/010},
3419 note = {\url{http://eprint.iacr.org/}}
3423 title = {Discrete Iterations, a Metric Study},
3424 publisher = {Springer-Verlag},
3426 editor = {Berlin Heidelberg New-York},
3427 author = {François Robert},
3429 series = {Series in Computational Mathematics}
3433 title = {Discrete Iterations: A Metric Study},
3435 editor = {Springer-Verlag},
3436 author = {F. Robert},
3438 series = {Springer Series in Computational Mathematics},
3440 timestamp = {17/02/2008}
3444 author = {Rudenko, O. and Snytkin, M.},
3445 title = {Image compression based on the neural network art},
3446 journal = {Cybernetics and Systems Analysis},
3450 affiliation = {Kharkov National University of Radio Electronics Kharkov Ukraine},
3453 keyword = {Computer Science},
3454 publisher = {Springer New York}
3457 @PHDTHESIS{Ruette2001,
3458 author = {Sylvie Ruette},
3459 title = {Chaos en dynamique topologique, en particulier sur l'intervalle,
3460 mesures d'entropie maximale},
3461 school = {Université d'Aix-Marseille II},
3463 optmonth = {Novembre},
3465 timestamp = {2008.01.02}
3468 @MASTERSTHESIS{Saulnier02,
3469 author = {Boris Saulnier},
3470 title = {Entropie topologique},
3471 school = {DEA Sémantique, Preuves et Langages, Paris 7},
3473 owner = {christophe},
3474 timestamp = {2010.08.12}
3477 @ARTICLE{Schmitz2001,
3478 author = {Roland Schmitz},
3479 title = {Use of chaotic dynamical systems in cryptography},
3480 journal = {Journal of Franklin Institute},
3485 timestamp = {17/02/2008}
3489 title = {Analyse: topologie g\'{e}n\'{e}rale et analyse fonctionnelle},
3490 publisher = {Hermann},
3493 author = {Laurent Schwartz},
3494 owner = {christophe},
3495 timestamp = {2010.09.15}
3499 author = {Shannon, Claude E.},
3500 title = {Communication Theory of Secrecy Systems},
3501 journal = {Bell Systems Technical Journal},
3505 citeulike-article-id = {507362},
3506 keywords = {master, secrecy\_systems, teoria-informacao, theory\_communication,
3507 theory\_cryptography},
3509 posted-at = {2006-02-16 23:24:09},
3511 timestamp = {2009.06.29}
3514 @ARTICLE{Shmygelska05,
3515 author = {Shmygelska, Alena and Hoos, Holger},
3516 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3517 polar protein folding problem},
3518 journal = {BMC Bioinformatics},
3523 abstract = {BACKGROUND:The protein folding problem is a fundamental problems in
3524 computational molecular biology and biochemical physics. Various
3525 optimisation methods have been applied to formulations of the ab-initio
3526 folding problem that are based on reduced models of protein structure,
3527 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3528 and hybrid approaches. In our work, we have introduced an ant colony
3529 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3530 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3531 from its amino acid sequence under a widely studied, conceptually
3532 simple model - the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3533 (HP) model.RESULTS:We present an improvement of our previous ACO
3534 algorithm for the 2D HP model and its extension to the 3D HP model.
3535 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3536 than previous state-of-the-art algorithms on sequences whose native
3537 conformations do not contain structural nuclei (parts of the native
3538 fold that predominantly consist of local interactions) at the ends,
3539 but rather in the middle of the sequence, and that it generally finds
3540 a more diverse set of native conformations.CONCLUSIONS:The application
3541 of ACO to this bioinformatics problem compares favourably with specialised,
3542 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3543 our empirical results indicate that our rather simple ACO algorithm
3544 scales worse with sequence length but usually finds a more diverse
3545 ensemble of native states. Therefore the development of ACO algorithms
3546 for more complex and realistic models of protein structure holds
3547 significant promise.},
3548 doi = {10.1186/1471-2105-6-30},
3550 pubmedid = {15710037}
3553 @OTHER{Shmygelska2005Feb,
3554 __markedentry = {[christophe]},
3555 abstract = {Abstract Background The protein folding problem is a fundamental problems
3556 in computational molecular biology and biochemical physics. Various
3557 optimisation methods have been applied to formulations of the ab-initio
3558 folding problem that are based on reduced models of protein structure,
3559 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3560 and hybrid approaches. In our work, we have introduced an ant colony
3561 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3562 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3563 from its amino acid sequence under a widely studied, conceptually
3564 simple model – the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3565 (HP) model. Results We present an improvement of our previous ACO
3566 algorithm for the 2D HP model and its extension to the 3D HP model.
3567 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3568 than previous state-of-the-art algorithms on sequences whose native
3569 conformations do not contain structural nuclei (parts of the native
3570 fold that predominantly consist of local interactions) at the ends,
3571 but rather in the middle of the sequence, and that it generally finds
3572 a more diverse set of native conformations. Conclusions The application
3573 of ACO to this bioinformatics problem compares favourably with specialised,
3574 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3575 our empirical results indicate that our rather simple ACO algorithm
3576 scales worse with sequence length but usually finds a more diverse
3577 ensemble of native states. Therefore the development of ACO algorithms
3578 for more complex and realistic models of protein structure holds
3579 significant promise.},
3580 author = {Shmygelska, Alena and Hoos, Holger H},
3581 journal = {BMC Bioinformatics. 2005 Feb 14},
3583 owner = {christophe},
3585 timestamp = {2011.01.24},
3586 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3587 polar protein folding problem},
3593 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
3594 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
3595 Their Roles in Cryptography and Pseudo-Random Coding},
3596 journal = {Proceedings of the 8th IMA International Conference on Cryptography
3601 owner = {christophe},
3602 timestamp = {2010.03.06}
3605 @INPROCEEDINGS{Simmons83,
3606 author = {Gustavus J. Simmons},
3607 title = {The Prisoners' Problem and the Subliminal Channel},
3608 booktitle = {Advances in Cryptology, Proc. CRYPTO'83},
3611 bibsource = {DBLP, http://dblp.uni-trier.de},
3613 timestamp = {2009.06.29}
3616 @ARTICLE{Solak2004389,
3617 author = {Ercan Solak},
3618 title = {On the security of a class of discrete-time chaotic cryptosystems},
3619 journal = {Physics Letters A},
3622 pages = {389 - 395},
3624 doi = {DOI: 10.1016/j.physleta.2003.11.008},
3626 keywords = {Communication using chaos},
3628 timestamp = {2009.12.12},
3629 url = {http://www.sciencedirect.com/science/article/B6TVM-4B22RC9-2/2/99a0af737c9b6ba8af47ae4d3c7a326d}
3632 @PHDTHESIS{Spiteri74,
3633 author = {Pierre Spitéri},
3634 title = {Contribution à l'étude de la stabilite au sens de liapounov de certains
3635 systemes differentiels non lineaires},
3636 school = {Université de Franche-Comté},
3638 owner = {christophe},
3639 timestamp = {2010.10.13}
3643 title = {Does God Play Dices ?: the mathematics of chaos},
3644 publisher = {Penguin},
3646 author = {Ian Stewart},
3648 timestamp = {2008.01.02}
3652 title = {Cryptography: Theory and Practice, Second Edition},
3653 publisher = {{Chapman \& Hall/CRC}},
3655 author = {Stinson, Douglas R.},
3657 abstract = {{Douglas R. Stinson's <I>Cryptography: Theory and Practice</I> is
3658 a mathematically intensive examination of cryptography, including
3659 ciphers, the Data Encryption Standard (DES), public key cryptography,
3660 one-way hash functions, and digital signatures. Stinson's explication
3661 of "zero-sum proofs"--a process by which one person lets another
3662 person know that he or she has a password without actually revealing
3663 any information--is especially good.<P> If you are new to the math
3664 behind cryptography but want to tackle it, the author covers all
3665 of the required background to understand the real mathematics here.
3666 <I>Cryptography</I> includes extensive exercises with each chapter
3667 and makes an ideal introduction for any math-literate person willing
3668 to get acquainted with this material.} {<P>Major advances over the
3669 last five years precipitated this major revision of the bestselling
3670 Cryptography: Theory and Practice. With more than 40 percent new
3671 or updated material, the second edition now provides an even more
3672 comprehensive treatment of modern cryptography. It focuses on the
3673 new Advanced Encryption Standards and features an entirely new chapter
3674 on that subject. Another new chapter explores the applications of
3675 secret sharing schemes, including ramp schemes, visual cryptography,
3676 threshold cryptography, and broadcast encryption. This is an ideal
3677 introductory text for both computer science and mathematics students
3678 and a valuable reference for professionals.</P>}},
3679 citeulike-article-id = {2401855},
3681 howpublished = {Hardcover},
3682 isbn = {1584882069},
3683 keywords = {security},
3684 posted-at = {2008-02-20 08:28:49},
3686 url = {http://www.amazon.com/exec/obidos/redirect?tag=citeulike07-20\&path=ASIN/1584882069}
3689 @INPROCEEDINGS{Takana90,
3690 author = {K. Tanaka and Y. Nakamura and K. Matsui},
3691 title = {Embedding Secret Information into a Dithered Multi-level Image},
3692 booktitle = {IEEE Military Communications Conference},
3694 owner = {christophe},
3695 timestamp = {2010.08.05}
3698 @PHDTHESIS{ElTarazi81,
3699 author = {M. N. El Tarazi},
3700 title = {Contraction et ordre partiel pour l'étude d'algorithmes synchrones
3701 et asynchrones en analyse numérique},
3702 school = {Faculté des Sciences et Techniques de l'Université de Franche-Comté,
3705 owner = {christophe},
3706 timestamp = {2010.08.17}
3709 @INPROCEEDINGS{Unger93,
3710 author = {Unger, Ron and Moult, John},
3711 title = {Genetic Algorithm for 3D Protein Folding Simulations},
3712 booktitle = {Proceedings of the 5th International Conference on Genetic Algorithms},
3715 address = {San Francisco, CA, USA},
3716 publisher = {Morgan Kaufmann Publishers Inc.},
3718 isbn = {1-55860-299-2},
3722 @MISC{Van93electronicwater,
3723 author = {Tirkel Rankin Van},
3724 title = {Electronic Water Mark},
3728 @ARTICLE{Venkatesan2007397,
3729 author = {R.C. Venkatesan},
3730 title = {Encryption of covert information into multiple statistical distributions},
3731 journal = {Physics Letters A},
3734 pages = {397 - 404},
3736 doi = {DOI: 10.1016/j.physleta.2007.05.117},
3738 keywords = {Statistical encryption/decryption},
3740 timestamp = {2009.12.12},
3741 url = {http://www.sciencedirect.com/science/article/B6TVM-4P4FV2M-1/2/cd11a2ec144526e3c4552d2a7e7906cc}
3745 author = {G. Voyatzis and I. Pitas},
3746 title = {Chaotic watermarks for embedding in the spatial digital image domain},
3747 journal = {Proceedings of IEEE ICIP},
3751 owner = {christophe},
3752 timestamp = {2010.03.06}
3755 @INCOLLECTION{Wagner03,
3756 author = {Wagner, David},
3757 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3758 booktitle = {Information Security},
3759 publisher = {Springer Berlin, Heidelberg},
3762 series = {Lecture Notes in Computer Science},
3764 abstract = {We use linear algebra to show that an algebraic privacy homomorphism
3765 proposed by Domingo-Ferrer is insecure for some parameter settings.},
3766 affiliation = {University of California, Berkeley USA}
3769 @INPROCEEDINGS{Wagner03cryptanalysisof,
3770 author = {David Wagner},
3771 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3772 booktitle = {Proc. Sixth Information Security Conf. (ISC03},
3777 @ARTICLE{Wang_ellipticcurve,
3778 author = {Haodong Wang and Bo Sheng and Qun Li},
3779 title = {Elliptic curve cryptography-based access control in sensor networks},
3780 journal = {Int. J. Security and Networks}
3783 @INPROCEEDINGS{wbg10:ip,
3784 author = {Wang, Qianxue and Bahi, Jacques M. and Guyeux, Christophe and Fang,
3786 title = {Randomness quality of {CI} chaotic generators. Application to Internet
3788 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
3791 address = {Valencia, Spain},
3793 publisher = {IEEE Computer Society Press},
3794 note = {Best Paper award},
3795 classement = {ACTI},
3796 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
3802 author = {X. M. Wang and J. S. Zhang and W. F. Zhang},
3803 title = {One-way hash function construction based on the extended chaotic
3805 journal = {Acta Phys. Sinici.},
3807 volume = {52, No. 11},
3808 pages = {2737--2742},
3810 timestamp = {2009.01.16}
3814 author = {Westhoff, Dirk and Girao, Joao and Acharya, Mithun},
3815 title = {Concealed Data Aggregation for Reverse Multicast Traffic in Sensor
3816 Networks: Encryption, Key Distribution, and Routing Adaptation},
3817 journal = {IEEE Transactions on Mobile Computing},
3820 pages = {1417--1431},
3822 address = {Piscataway, NJ, USA},
3823 doi = {http://dx.doi.org/10.1109/TMC.2006.144},
3825 publisher = {IEEE Educational Activities Department}
3829 author = {Wikipédia},
3830 title = {Exposant de Lyapunov -- Site web d'André Lévesque},
3832 note = {[En ligne; Page disponible le 9-septembre-2010]},
3833 url = {\url{http://math.cmaisonneuve.qc.ca/alevesque/chaos_fract/Lyapunov/Exposant.html}}
3837 author = {Wikipédia},
3838 title = {Espace complet --- Wikipédia{,} l'encyclopédie libre},
3840 note = {[En ligne; Page disponible le 9-août-2010]},
3841 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Espace_complet&oldid=52734266}}
3845 author = {Wikipédia},
3846 title = {Densité (mathématiques) --- Wikipédia{,} l'encyclopédie libre},
3848 note = {[En ligne; Page disponible le 8-août-2010]},
3849 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Densit%C3%A9_(math%C3%A9matiques)&oldid=53938121}}
3853 author = {Wikipédia},
3854 title = {Information de Fisher --- Wikipédia{,} l'encyclopédie libre},
3856 note = {[En ligne; Page disponible le 5-août-2010]},
3857 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Information_de_Fisher&oldid=52877871}}
3860 @MISC{wiki:Kerkhoffs,
3861 author = {Wikipédia},
3862 title = {Principe de Kerckhoffs --- Wikipédia{,} l'encyclopédie libre},
3864 note = {[En ligne; Page disponible le 20-août-2010]},
3865 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Principe_de_Kerckhoffs&oldid=52133114}}
3868 @MISC{wiki:sarkovskii,
3869 author = {Wikipédia},
3870 title = {Théorème de Sarkovskii --- Wikipédia{,} l'encyclopédie libre},
3872 note = {[En ligne; Page disponible le 8-août-2010]},
3873 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Th%C3%A9or%C3%A8me_de_Sarkovskii&oldid=54196167}}
3876 @MISC{wiki:steganographie,
3877 author = {Wikipédia},
3878 title = {Stéganographie --- Wikipédia{,} l'encyclopédie libre},
3880 note = {[En ligne; Page disponible le 5-août-2010]},
3881 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=St%C3%A9ganographie&oldid=54724435}}
3884 @MISC{wiki:tatouage,
3885 author = {Wikipédia},
3886 title = {Tatouage numérique --- Wikipédia{,} l'encyclopédie libre},
3888 note = {[En ligne; Page disponible le 5-août-2010]},
3889 url = {https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Tatouage_num%C3%A9rique&oldid=55484940}
3892 @MISC{wiki:testsHypothese,
3893 author = {Wikipédia},
3894 title = {Test d'hypothèse --- Wikipédia{,} l'encyclopédie libre},
3896 note = {[En ligne; Page disponible le 5-août-2010]},
3897 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Test_d%27hypoth%C3%A8se&oldid=55344108}}
3901 author = {Xianyong Wu and Zhi-Hong Guan},
3902 title = {A novel digital watermark algorithm based on chaotic maps},
3903 journal = {Physics Letters A},
3906 pages = {403 - 406},
3908 doi = {DOI: 10.1016/j.physleta.2007.01.034},
3910 keywords = {Watermarking},
3911 url = {http://www.sciencedirect.com/science/article/B6TVM-4MY0MF3-8/2/0b4d1298fa84337d2e59b3fefe26f583}
3914 @INPROCEEDINGS{Wu2007,
3915 author = {Wu, Xianyong and Guan, Zhi-Hong and Wu, Zhengping},
3916 title = {A Chaos Based Robust Spatial Domain Watermarking Algorithm},
3917 booktitle = {ISNN '07: Proceedings of the 4th international symposium on Neural
3921 address = {Berlin, Heidelberg},
3922 publisher = {Springer-Verlag},
3923 doi = {http://dx.doi.org/10.1007/978-3-540-72393-6_15},
3924 isbn = {978-3-540-72392-9},
3925 location = {Nanjing, China}
3928 @ARTICLE{Xiao20092288,
3929 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3930 title = {Parallel keyed hash function construction based on chaotic neural
3932 journal = {Neurocomputing},
3935 pages = {2288 - 2296},
3937 note = {Lattice Computing and Natural Computing (JCIS 2007) / Neural Networks
3938 in Intelligent Systems Designn (ISDA 2007)},
3939 abstract = {Recently, various hash functions based on chaos or neural networks
3940 were proposed. Nevertheless, none of them works efficiently in parallel
3941 computing environment. In this paper, an algorithm for parallel keyed
3942 hash function construction based on chaotic neural network is proposed.
3943 The mechanism of changeable-parameter and self-synchronization establishes
3944 a close relation between the hash value bit and message, and the
3945 algorithm structure ensures the uniform sensitivity of the hash value
3946 to the message blocks at different positions. The proposed algorithm
3947 can satisfy the performance requirements of hash function. These
3948 properties make it a promising choice for hashing on parallel computing
3951 keywords = {Chaotic neural network}
3954 @ARTICLE{Xiao20094346,
3955 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3956 title = {Improving the security of a parallel keyed hash function based on
3958 journal = {Physics Letters A},
3961 pages = {4346 - 4353},
3964 keywords = {Hash function},
3966 timestamp = {2009.12.12}
3969 @ARTICLE{Xiao20102254,
3970 author = {Di Xiao and Frank Y. Shih and Xiaofeng Liao},
3971 title = {A chaos-based hash function with both modification detection and
3972 localization capabilities},
3973 journal = {Communications in Nonlinear Science and Numerical Simulation},
3976 pages = {2254 - 2261},
3978 abstract = {Recently, a variety of chaos-based hash functions have been proposed.
3979 Nevertheless, none of them can realize modification localization.
3980 In this paper, a hash function with both modification detection and
3981 localization capabilities is proposed, which can also support the
3982 parallel processing mode. By using the mechanism of changeable-parameter
3983 and self-synchronization, the keystream can establish a close relation
3984 with the algorithm key, the content, and the order of each message
3985 unit. Theoretical analysis and computer simulation indicate that
3986 the proposed algorithm can satisfy the performance requirements of
3989 keywords = {Hash function}
3992 @INPROCEEDINGS{Yu06,
3993 author = {Yu, Yu and Leiwo, Jussipekka and Premkumar, Benjamin},
3994 title = {A Study on the Security of Privacy Homomorphism},
3995 booktitle = {ITNG '06: Proceedings of the Third International Conference on Information
3996 Technology: New Generations},
3999 address = {Washington, DC, USA},
4000 publisher = {IEEE Computer Society},
4001 doi = {http://dx.doi.org/10.1109/ITNG.2006.19},
4002 isbn = {0-7695-2497-4}
4005 @ARTICLE{Zhang2008658,
4006 author = {Wei Zhang and Yonghe Liu and Sajal K. Das and Pradip De},
4007 title = {Secure data aggregation in wireless sensor networks: A watermark
4008 based authentication supportive approach},
4009 journal = {Pervasive and Mobile Computing},
4012 pages = {658 - 680},
4014 doi = {DOI: 10.1016/j.pmcj.2008.05.005},
4016 keywords = {Wireless sensor networks},
4017 url = {http://www.sciencedirect.com/science/article/B7MF1-4SKB3MD-1/2/b73948dcaa3eb63a2c21d09041882625}
4021 author = {Zhang, Yang and Arakaki, Adrian K. and Skolnick, Jeffrey},
4022 title = {TASSER: An automated method for the prediction of protein tertiary
4023 structures in CASP6},
4024 journal = {Proteins},
4030 keywords = {comparative modeling, threading, ab initio prediction, TASSER, PROSPECTOR_3},
4031 owner = {christophe},
4032 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
4033 timestamp = {2011.01.22},
4034 url = {http://dx.doi.org/10.1002/prot.20724}
4037 @ARTICLE{Zhou1997429,
4038 author = {Chang-song Zhou and Tian-lun Chen},
4039 title = {Extracting information masked by chaos and contaminated with noise:
4040 Some considerations on the security of communication approaches using
4042 journal = {Physics Letters A},
4045 pages = {429 - 435},
4048 keywords = {Communication},
4050 timestamp = {2009.12.12}
4054 author = {Zhou, Huai-bei and Wang, Lu},
4055 title = {Chaos in Biomolecular Dynamics},
4056 journal = {The Journal of Physical Chemistry},
4059 pages = {8101-8105},
4061 doi = {10.1021/jp953409x}
4064 @PROCEEDINGS{DBLP:conf/iwdw/2005,
4065 title = {IWDW'05: 4th International Workshop on Digital Watermarking},
4067 editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim},
4069 series = {Lecture Notes in Computer Science},
4070 address = {Siena, Italy},
4071 publisher = {Springer},
4072 month = {September 15-17},
4073 bibsource = {DBLP, http://dblp.uni-trier.de},
4075 isbn = {3-540-28768-X},
4077 timestamp = {2009.06.29}
4080 @PROCEEDINGS{DBLP:conf/ih/2006,
4081 title = {IH 2006: Information Hiding, 8th International Workshop},
4083 editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil
4086 series = {Lecture Notes in Computer Science},
4087 address = {Alexandria, VA, USA},
4088 publisher = {Springer},
4090 bibsource = {DBLP, http://dblp.uni-trier.de},
4091 booktitle = {Information Hiding},
4092 isbn = {978-3-540-74123-7},
4094 timestamp = {2009.06.29}
4097 @PROCEEDINGS{DBLP:conf/ih/2007,
4098 title = {Information Hiding, 9th International Workshop, IH 2007, Saint Malo,
4099 France, June 11-13, 2007, Revised Selected Papers},
4101 editor = {Teddy Furon and Fran\c{c}ois Cayre and Gwena{\"e}l J. Do{\"e}rr and
4104 series = {Lecture Notes in Computer Science},
4105 publisher = {Springer},
4106 bibsource = {DBLP, http://dblp.uni-trier.de},
4107 booktitle = {Information Hiding},
4108 isbn = {978-3-540-77369-6},
4110 timestamp = {2009.06.29}
4113 @PROCEEDINGS{DBLP:conf/iccsa/2006-1,
4114 title = {Computational Science and Its Applications - ICCSA 2006, International
4115 Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I},
4117 editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih
4118 Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`a} and Youngsong
4119 Mun and Hyunseung Choo},
4121 series = {Lecture Notes in Computer Science},
4122 publisher = {Springer},
4123 bibsource = {DBLP, http://dblp.uni-trier.de},
4124 booktitle = {ICCSA (1)},
4125 isbn = {3-540-34070-X}
4128 @PROCEEDINGS{DBLP:conf/secrypt/2010,
4129 title = {SECRYPT 2010 - Proceedings of the International Conference on Security
4130 and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part
4131 of ICETE - The International Joint Conference on e-Business and Telecommunications},
4133 editor = {Sokratis K. Katsikas and Pierangela Samarati},
4134 publisher = {SciTePress},
4135 bibsource = {DBLP, http://dblp.uni-trier.de},
4136 booktitle = {SECRYPT},
4137 isbn = {978-989-8425-18-8}
4140 @BOOK{Katzenbeisser00,
4141 title = {Information Hiding Techniques for Steganography and Digital Watermarking},
4142 publisher = {Artech House, Inc.},
4144 editor = {Katzenbeisser, Stefan and Petitcolas, Fabien A.},
4145 address = {Norwood, MA, USA},
4149 @PROCEEDINGS{DBLP:conf/ih/1999,
4150 title = {IH'99: 3rd International Workshop on Information Hiding},
4152 editor = {Andreas Pfitzmann},
4154 series = {Lecture Notes in Computer Science},
4155 address = {Dresden, Germany},
4156 publisher = {Springer},
4157 month = {September 29 - October 1.},
4158 bibsource = {DBLP, http://dblp.uni-trier.de},
4159 booktitle = {Information Hiding},
4160 isbn = {3-540-67182-X},
4162 timestamp = {2009.06.29}
4165 @PROCEEDINGS{DBLP:conf/indocrypt/2000,
4166 title = {Progress in Cryptology - INDOCRYPT 2000, First International Conference
4167 in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
4169 editor = {Bimal K. Roy and Eiji Okamoto},
4171 series = {Lecture Notes in Computer Science},
4172 publisher = {Springer},
4173 bibsource = {DBLP, http://dblp.uni-trier.de},
4174 booktitle = {INDOCRYPT},
4175 isbn = {3-540-41452-5}
4178 @BOOK{DBLP:reference/icsec/2010,
4179 title = {Handbook of Information and Communication Security},
4180 publisher = {Springer},
4182 editor = {Peter P. Stavroulakis and Mark Stamp},
4183 bibsource = {DBLP, http://dblp.uni-trier.de},
4184 booktitle = {Handbook of Information and Communication Security},
4185 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4},
4186 isbn = {978-3-642-04116-7}
4189 @PROCEEDINGS{DBLP:conf/isnn/2004-2,
4190 title = {Advances in Neural Networks - ISNN 2004, International Symposium
4191 on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,
4194 editor = {Fuliang Yin and Jun Wang and Chengan Guo},
4196 series = {Lecture Notes in Computer Science},
4197 publisher = {Springer},
4198 bibsource = {DBLP, http://dblp.uni-trier.de},
4199 booktitle = {ISNN (2)},
4200 isbn = {3-540-22843-8}
4203 @PROCEEDINGS{DBLP:conf/adhocnets/2010,
4204 title = {Ad Hoc Networks - Second International Conference, ADHOCNETS 2010,
4205 Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers},
4207 editor = {Jun Zheng and David Simplot-Ryl and Victor C. M. Leung},
4209 series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
4210 and Telecommunications Engineering},
4211 publisher = {Springer},
4212 bibsource = {DBLP, http://dblp.uni-trier.de},
4213 booktitle = {ADHOCNETS},
4214 ee = {http://dx.doi.org/10.1007/978-3-642-17994-5},
4215 isbn = {978-3-642-17993-8}
4220 timestamp = {2011.03.29}
4224 title = {Delicious social bookmarking, http://delicious.com/},
4225 comment = {http://delicious.com/},
4227 url = {http://delicious.com/}
4231 title = {The Frick Collection, http://www.frick.org/},
4232 comment = {http://www.frick.org/},
4234 url = {http://www.frick.org/}
4238 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4239 2010, Barcelona, Spain, 18-23 July 2010},
4242 bibsource = {DBLP, http://dblp.uni-trier.de},
4243 booktitle = {IEEE Congress on Evolutionary Computation}
4246 @PROCEEDINGS{DBLP:conf/cec/2010,
4247 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4248 2010, Barcelona, Spain, 18-23 July 2010},
4251 bibsource = {DBLP, http://dblp.uni-trier.de},
4252 booktitle = {IEEE Congress on Evolutionary Computation}
4255 @PROCEEDINGS{DBLP:conf/date/2010,
4256 title = {Design, Automation and Test in Europe, DATE 2010, Dresden, Germany,
4260 bibsource = {DBLP, http://dblp.uni-trier.de},
4264 @PROCEEDINGS{DBLP:conf/cse/2009,
4265 title = {Proceedings IEEE CSE'09, 12th IEEE International Conference on Computational
4266 Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada},
4268 publisher = {IEEE Computer Society},
4269 bibsource = {DBLP, http://dblp.uni-trier.de},
4273 @PROCEEDINGS{DBLP:conf/icumt/2009,
4274 title = {Proceedings of the International Conference on Ultra Modern Telecommunications,
4275 ICUMT 2009, 12-14 October 2009, St. Petersburg, Russia},
4278 bibsource = {DBLP, http://dblp.uni-trier.de},
4282 @PROCEEDINGS{DBLP:conf/focs/2008,
4283 title = {49th Annual IEEE Symposium on Foundations of Computer Science, FOCS
4284 2008, October 25-28, 2008, Philadelphia, PA, USA},
4286 publisher = {IEEE Computer Society},
4287 bibsource = {DBLP, http://dblp.uni-trier.de},
4291 @comment{jabref-meta: selector_publisher:}
4293 @comment{jabref-meta: selector_author:}
4295 @comment{jabref-meta: selector_journal:}
4297 @comment{jabref-meta: selector_keywords:Chaos;Entropie Topologique;Tip
4302 @InProceedings{Pang:2008:cec,
4303 author = "Wai-Man Pang and Tien-Tsin Wong and Pheng-Ann Heng",
4304 title = "Generating Massive High-Quality Random Numbers using
4306 booktitle = "2008 IEEE World Congress on Computational
4309 editor = "Jun Wang",
4310 address = "Hong Kong",
4311 organization = "IEEE Computational Intelligence Society",
4312 publisher = "IEEE Press",
4316 @Article{LEcuyerS07,
4317 title = "Test{U01}: {A} {C} library for empirical testing of
4318 random number generators",
4319 author = "Pierre L'Ecuyer and Richard J. Simard",
4320 journal = "ACM Trans. Math. Softw",
4324 bibdate = "2007-11-06",
4326 http://dblp.uni-trier.de/db/journals/toms/toms33.html#LEcuyerS07",
4327 URL = "http://doi.acm.org/10.1145/1268776.1268777",
4331 author = {A. Zhmurov and K. Rybnikov and Y. Kholodov and V. Barsegov},
4332 title = {Generation of Random Numbers on Graphics Processors: Forced Indentation In Silico of the Bacteriophage HK97},
4333 journal = {J. Phys. Chem. B},
4337 pages = {5278--5288},
4342 @comment {regarder : Pseudo-Random Number Generation for Brownian Dynamics and Dissipative Particle Dynamics Simulations on GPU Devices}
4343 @comment {CL Phillips, JA Anderson… - Journal of Computational Physics, 2011 - Elsevier}
4345 @InProceedings{conf/fpga/ThomasHL09,
4346 title = "A comparison of {CPU}s, {GPU}s, {FPGA}s, and massively
4347 parallel processor arrays for random number
4349 author = "David B. Thomas and Lee W. Howes and Wayne Luk",
4350 booktitle = "Proceedings of the {ACM}/{SIGDA} 17th International
4351 Symposium on Field Programmable Gate Arrays, {FPGA}
4352 2009, Monterey, California, {USA}, February 22-24,
4354 bibdate = "2010-06-29",
4357 editor = "Paul Chow and Peter Y. K. Cheung",
4358 ISBN = "978-1-60558-410-2",
4360 URL = "http://doi.acm.org/10.1145/1508128.1508139",
4365 @InProceedings{Jenkins96,
4368 booktitle = "IWFSE: International Workshop on Fast Software
4375 title = {Cuda cublas library},
4377 Note = {Version 4.0},
4382 title = {Curand library},
4384 Note = {Version 4.0},
4390 author = {Lenore Blum and Manuel Blum and Michael Shub},
4391 title = {A Simple Unpredictable Pseudo-Random Number Generator},
4392 journal = {SIAM Journal on Computing},
4399 author = {Oded Goldreich},
4401 title = {Foundations of Cryptography: Basic Tools},
4402 publisher = {Cambridge University Press},