X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/prng_gpu.git/blobdiff_plain/5868f4ee274d7fc021616da109c53b54c99529a0..a12a11a39f112c043de69e8694f29b32b8c7dbc5:/mabase.bib?ds=inline diff --git a/mabase.bib b/mabase.bib index 16ad9f6..41edde2 100644 --- a/mabase.bib +++ b/mabase.bib @@ -14,6 +14,73 @@ timestamp = {2009.06.29} } +@book{guyeux12:bc, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {OS}, +author = {Guyeux, Christophe}, +title = {Le d\'esordre des it\'erations chaotiques - Applications aux r\'eseaux de capteurs, \`a la dissimulation d'information, et aux fonctions de hachage}, +abstract = {Les itérations chaotiques, un outil issu des mathématiques discrètes, sont pour la première fois étudiées pour obtenir de la divergence et du désordre. Après avoir utilisé les mathématiques discrètes pour en déduire des situations de non convergence, ces itérations sont modélisées sous la forme d'un système dynamique et sont étudiées topologiquement dans le cadre de la théorie mathématique du chaos. Nous prouvons que leur adjectif « chaotique » a été bien choisi : ces itérations sont du chaos aux sens de Devaney, Li-Yorke, l'expansivité, l'entropie topologique et l'exposant de Lyapunov, etc. Ces propriétés ayant été établies pour une topologie autre que la topologie de l'ordre, les conséquences de ce choix sont discutées. Nous montrons alors que ces itérations chaotiques peuvent être portées telles quelles sur ordinateur, sans perte de propriétés, et qu'il est possible de contourner le problème de la finitude des ordinateurs pour obtenir des programmes aux comportements prouvés chaotiques selon Devaney, etc. Cette manière de faire est respectée pour générer des algorithmes de tatouage numérique et des fonction de hachage chaotiques au sens le plus fort qui soit.}, +publisher = {\'Editions Universitaires Europ\'eennes}, +isbn = {978-3-8417-9417-8}, +year = 2012, +note = {ISBN 978-3-8417-9417-8. 362 pages. Publication de la thèse de doctorat.}, +} + +@inproceedings{bfg12a:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Bahi, Jacques and Fang, Xiaole and Guyeux, Christophe}, +title = {An optimization technique on pseudorandom generators based on chaotic iterations}, +booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet}, +pages = {***--***}, +address = {Venice, Italy}, +month = jun, +year = 2012, +note = {To appear}, + +} + +@UNPUBLISHED{ANDREW2008, + author = {NIST Special Publication 800-22 rev. 1}, + title = {A Statistical Test Suite for Random and Pseudorandom Number Generators + for Cryptographic Applications}, + year = {August 2008}, + owner = {qianxue}, + timestamp = {2009.01.22} +} + +@Article{combined_lcg, + title = "Efficient and portable combined random number generators", + author = {}, + journal = "Communications of the ACM", + volume = "31", + number = "6", + pages = "742--749", + year = "1988", +} + + +@INPROCEEDINGS{Fischlin, + author = {Fischlin, R. and Schnorr, C. P.}, + title = {Stronger security proofs for RSA and rabin bits}, + booktitle = {Proceedings of the 16th annual international conference on Theory + and application of cryptographic techniques}, + year = {1997}, + series = {EUROCRYPT'97}, + pages = {267--279}, + address = {Berlin, Heidelberg}, + publisher = {Springer-Verlag}, + acmid = {1754569}, + isbn = {3-540-62975-0}, + location = {Konstanz, Germany}, + numpages = {13}, + url = {http://dl.acm.org/citation.cfm?id=1754542.1754569} +} + @INPROCEEDINGS{BattiatoCGG99, author = {Sebastiano Battiato and Dario Catalano and Giovanni Gallo and Rosario Gennaro}, @@ -112,6 +179,7 @@ timestamp = {2009.06.29} } + @INPROCEEDINGS{DBLP:conf/cec/HiggsSHS10, author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar}, title = {Genetic algorithm feature-based resampling for protein structure @@ -753,8 +821,26 @@ year = {1999} } + +@inproceedings{Blum:1985:EPP:19478.19501, + author = {Blum, Manuel and Goldwasser, Shafi}, + title = {An efficient probabilistic public key encryption scheme which hides all partial information}, + booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology}, + year = {1985}, + isbn = {0-387-15658-5}, + location = {Santa Barbara, California, United States}, + pages = {289--302}, + numpages = {14}, + url = {http://dl.acm.org/citation.cfm?id=19478.19501}, + acmid = {19501}, + publisher = {Springer-Verlag New York, Inc.}, + address = {New York, NY, USA}, + keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption}, +} + + @INPROCEEDINGS{bcgr11:ip, - author = {Bahi, Jacques and Couchot, Jean-fran\c{c}ois and Guyeux, Christophe + author = {Bahi, Jacques M. and Couchot, Jean-fran\c{c}ois and Guyeux, Christophe and Richard, Adrien}, title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems}, @@ -773,7 +859,7 @@ } @ARTICLE{bg10:ij, - author = {Bahi, Jacques and Guyeux, Christophe}, + author = {Bahi, Jacques M. and Guyeux, Christophe}, title = {Hash Functions Using Chaotic Iterations}, journal = {Journal of Algorithms \& Computational Technology}, year = {2010}, @@ -791,7 +877,7 @@ } @INPROCEEDINGS{guyeux10ter, - author = {Bahi, Jacques and Guyeux, Christophe}, + author = {Bahi, Jacques M. and Guyeux, Christophe}, title = {A new chaos-based watermarking algorithm}, booktitle = {SECRYPT'10, Int. conf. on security and cryptography}, year = {2010}, @@ -806,7 +892,7 @@ } @INPROCEEDINGS{bgc11:ip, - author = {Bahi, Jacques and Guyeux, Christophe and Cote, Nathalie}, + author = {Bahi, Jacques M. and Guyeux, Christophe and Cote, Nathalie}, title = {Chaos of Protein Folding}, booktitle = {IJCNN 2011, Int. Joint Conf. on Neural Networks}, year = {2011}, @@ -821,7 +907,7 @@ } @INPROCEEDINGS{guyeux10bis, - author = {Bahi, Jacques and Guyeux, Christophe and Makhoul, Abdallah}, + author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah}, title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks}, booktitle = {SENSORCOMM'10, 4-th Int. Conf. on Sensor Technologies and Applications}, @@ -838,7 +924,7 @@ } @INPROCEEDINGS{guyeuxVictoria, - author = {Bahi, Jacques and Guyeux, Christophe and Makhoul, Abdallah}, + author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah}, title = {Secure Data Aggregation in Wireless Sensor Networks. Homomorphism versus Watermarking Approach}, booktitle = {ADHOCNETS 2010, 2nd Int. Conf. on Ad Hoc Networks}, @@ -857,7 +943,7 @@ } @INPROCEEDINGS{bgs11:ip, - author = {Bahi, Jacques and Guyeux, Christophe and Salomon, Michel}, + author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel}, title = {Building a Chaotic Proven Neural Network}, booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security}, @@ -872,7 +958,7 @@ } @INPROCEEDINGS{bgw10:ip, - author = {Bahi, Jacques and Guyeux, Christophe and Wang, Qianxue}, + author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue}, title = {A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application to Watermarking}, booktitle = {WISM 2010, Int. Conf. on Web Information Systems and Mining}, @@ -891,7 +977,7 @@ } @INPROCEEDINGS{bgw09:ip, - author = {Bahi, Jacques and Guyeux, Christophe and Wang, Qianxue}, + author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue}, title = {A novel pseudo-random generator based on discrete chaotic iterations}, booktitle = {INTERNET'09, 1-st Int. Conf. on Evolving Internet}, year = {2009}, @@ -905,7 +991,7 @@ } @INPROCEEDINGS{bmg10:onp, - author = {Bahi, Jacques and Makhoul, Abdallah and Guyeux, Christophe}, + author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe}, title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks for critical applications}, booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS @@ -921,7 +1007,7 @@ } @INPROCEEDINGS{guyeuxBayonne, - author = {Bahi, Jacques and Makhoul, Abdallah and Guyeux, Christophe}, + author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe}, title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks for critical applications}, booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS @@ -936,7 +1022,7 @@ } @ARTICLE{bs10:ij, - author = {Bahi, Jacques and Salomon, Michel}, + author = {Bahi, Jacques M. and Salomon, Michel}, title = {A Decentralized Energy-based Diffusion Algorithm to Increase the Lifetime of {MANETs}}, journal = {Computer Networks Journal}, @@ -3034,6 +3120,14 @@ timestamp = {2009.11.09} } +@ARTICLE{Simard07testu01:a, + author = {Richard Simard and Université De Montréal}, + title = {TestU01: A C library for empirical testing of random number generators}, + journal = {ACM Transactions on Mathematical Software}, + year = {2007}, + pages = {2007} +} + @ARTICLE{DefiningChaos, author = {M. Martelli and M. Dang and T. Seph}, title = {Defining chaos}, @@ -3675,7 +3769,7 @@ } @INPROCEEDINGS{wbg10:ip, - author = {Wang, Qianxue and Bahi, Jacques and Guyeux, Christophe and Fang, + author = {Wang, Qianxue and Bahi, Jacques M. and Guyeux, Christophe and Fang, Xiaole}, title = {Randomness quality of {CI} chaotic generators. Application to Internet security}, @@ -4222,7 +4316,7 @@ } @Article{ZRKB10, - author = {A. Zhmurov, K. Rybnikov, Y. Kholodov, and V. Barsegov}, + author = {A. Zhmurov and K. Rybnikov and Y. Kholodov and V. Barsegov}, title = {Generation of Random Numbers on Graphics Processors: Forced Indentation In Silico of the Bacteriophage HK97}, journal = {J. Phys. Chem. B}, year = {2011}, @@ -4288,3 +4382,13 @@ booktitle = "Proceedings of the {ACM}/{SIGDA} 17th International volume = {15}, pages = {364--383}, } + +@Book{Goldreich, + author = {Oded Goldreich}, + ALTeditor = {}, + title = {Foundations of Cryptography: Basic Tools}, + publisher = {Cambridge University Press}, + year = {2007}, +} + +