]> AND Private Git Repository - these_qian.git/blobdiff - Thesis.bib
Logo AND Algorithmique Numérique Distribuée

Private GIT Repository
change .bib
[these_qian.git] / Thesis.bib
index 3836d5ba77897c5e505456265a3f894783647bf5..6555d75003a5b36a42b25c062885b7b213f7ad6f 100644 (file)
@@ -7,7 +7,77 @@
        year = "2008",
        crossref = "DBLP:conf/seta/2008",
        bibsource = "DBLP, http://dblp.uni-trier.de",
-       ee = "http://dx.doi.org/10.1007/978-3-540-85912-3\\\\\\\\\\\\_1"
+       ee = "http://dx.doi.org/10.1007/978-3-540-85912-3\\\\\\\\\\\\\_1"
+}
+
+@Article{ Zaher20113721,
+       title = "On the design of chaos-based secure communication systems",
+       journal = "Communications in Nonlinear Science and Numerical Simulation",
+       volume = "16",
+       number = "9",
+       pages = "3721--3737",
+       year = "2011",
+       note = "",
+       issn = "1007-5704",
+       doi = "10.1016/j.cnsns.2010.12.032",
+       url = "http://www.sciencedirect.com/science/article/pii/S1007570411000037",
+       author = "Ashraf A. Zaher and Abdulnasser Abu-Rezq",
+       keywords = "Chaos-based secure communication",
+       keywords1 = "Chaos synchronization",
+       keywords2 = "Cryptography",
+       keywords3 = "Parameter identification",
+       keywords4 = "Lyapunov functions"
+}
+
+@Article{ Wong200367,
+       title = "A chaotic cryptography scheme for generating short ciphertext",
+       journal = "Physics Letters A",
+       volume = "310",
+       number = "1",
+       pages = "67--73",
+       year = "2003",
+       note = "",
+       issn = "0375-9601",
+       doi = "10.1016/S0375-9601(03)00259-7",
+       url = "http://www.sciencedirect.com/science/article/pii/S0375960103002597",
+       author = "Kwok-Wo Wong and Sun-Wah Ho and Ching-Ki Yung",
+       keywords = "Chaos",
+       keywords1 = "Cryptography",
+       keywords2 = "Logistic map"
+}
+
+@Article{ Roland2001429,
+       title = "Use of chaotic dynamical systems in cryptography",
+       journal = "Journal of the Franklin Institute",
+       volume = "338",
+       number = "4",
+       pages = "429--441",
+       year = "2001",
+       note = "",
+       issn = "0016-0032",
+       doi = "10.1016/S0016-0032(00)00087-9",
+       url = "http://www.sciencedirect.com/science/article/pii/S0016003200000879",
+       author = "Roland and Schmitz",
+       keywords = "Cryptography",
+       keywords1 = "Chaos"
+}
+
+@Article{ MS199850,
+       title = "Cryptography with chaos",
+       journal = "Physics Letters A",
+       volume = "240",
+       number = "1-2",
+       pages = "50--54",
+       year = "1998",
+       note = "",
+       issn = "0375-9601",
+       doi = "10.1016/S0375-9601(98)00086-3",
+       url = "http://www.sciencedirect.com/science/article/pii/S0375960198000863",
+       author = "M.S. and Baptista",
+       keywords = "Chaos",
+       keywords1 = "Cryptography",
+       keywords2 = "Message",
+       keywords3 = "Security"
 }
 
 @Article{ DeMicco20083373,
        keywords2 = "Random number generators"
 }
 
+@Article{ WT198429,
+       title = "The design of a truly random monolithic noise generator",
+       journal = "Microelectronics Journal",
+       volume = "15",
+       number = "4",
+       pages = "29--40",
+       year = "1984",
+       note = "",
+       issn = "0026-2692",
+       doi = "10.1016/S0026-2692(84)80068-3",
+       url = "http://www.sciencedirect.com/science/article/pii/S0026269284800683",
+       author = "W.T. and Penzhorn"
+}
+
 @Article{ Vadim2011692,
        title = "Pseudo-random number generators for Monte Carlo simulations on ATI Graphics Processing Units",
        journal = "Computer Physics Communications",
 
 @Misc{ Frick,
        title = "The Frick Collection, http://www.frick.org/",
-       comment = "http://www.frick.org/",
        type = "web page",
-       url = "http://www.frick.org/"
+       url = "http://www.frick.org/",
+       comment = "http://www.frick.org/"
 }
 
 @Misc{ Delicious,
        title = "Delicious social bookmarking, http://delicious.com/",
-       comment = "http://delicious.com/",
        type = "web page",
-       url = "http://delicious.com/"
+       url = "http://delicious.com/",
+       comment = "http://delicious.com/"
 }
 
 @Book{ ita09,
        timestamp = "2010.02.05"
 }
 
+@InBook{ Knuth1998_2,
+       title = "The Art of Computer Programming, Volume 2: Seminumerical Algorithms",
+       author = "D. E. Knuth",
+       editor = "Reading and Mass and {third edition}",
+       publisher = "Addison-Wesley",
+       year = "1998",
+       pages = "29",
+       chapter = "3",
+       volume = "2",
+       owner = "qianxue",
+       timestamp = "2010.02.05"
+}
+
+@InCollection{ tagkey2009407,
+       title = "Appendix E - Linear Feedback Shift Registers (LFSRs)",
+       editor = "",
+       booktitle = "Bebop to the Boolean Boogie (Third Edition)",
+       publisher = "Newnes",
+       edition = "Third Edition",
+       address = "Boston",
+       year = "2009",
+       pages = "407--422",
+       isbn = "978-1-85617-507-4",
+       doi = "10.1016/B978-1-85617-507-4.00033-4",
+       url = "http://www.sciencedirect.com/science/article/pii/B9781856175074000334",
+       key = "tagkey2009407",
+       author = "noname noname"
+}
+
+@Article{ Linardatos2002157,
+       title = "Synthesis of minimal cost nonlinear feedback shift registers",
+       journal = "Signal Processing",
+       volume = "82",
+       number = "2",
+       pages = "157--176",
+       year = "2002",
+       note = "",
+       issn = "0165-1684",
+       doi = "10.1016/S0165-1684(01)00172-4",
+       url = "http://www.sciencedirect.com/science/article/pii/S0165168401001724",
+       author = "D. Linardatos and N. Kalouptsidis",
+       keywords = "Nonlinear feedback shift registers",
+       keywords1 = "Berlekamp--Massey algorithm",
+       keywords2 = "FIA"
+}
+
+@Article{ Klapper199961,
+       title = "Algebraic feedback shift registers",
+       journal = "Theoretical Computer Science",
+       volume = "226",
+       number = "1-2",
+       pages = "61--92",
+       year = "1999",
+       note = "",
+       issn = "0304-3975",
+       doi = "10.1016/S0304-3975(99)00066-3",
+       url = "http://www.sciencedirect.com/science/article/pii/S0304397599000663",
+       author = "Andrew Klapper and Jinzhong Xu",
+       keywords = "Cryptography",
+       keywords1 = "Feedback shift register",
+       keywords2 = "Complete ring",
+       keywords3 = "Stream cipher",
+       keywords4 = "Pseudo-random number generator"
+}
+
+@Article{ Mykkeltveit1979202,
+       title = "On the cycle structure of some nonlinear shift register sequences",
+       journal = "Information and Control",
+       volume = "43",
+       number = "2",
+       pages = "202--215",
+       year = "1979",
+       note = "",
+       issn = "0019-9958",
+       doi = "10.1016/S0019-9958(79)90708-3",
+       url = "http://www.sciencedirect.com/science/article/pii/S0019995879907083",
+       author = "Johannes Mykkeltveit and Man-Keung Siu and Po Tong"
+}
+
+@Article{ Unjeng198461,
+       title = "On the cycle structure of certain classes of nonlinear shift registers",
+       journal = "Journal of Combinatorial Theory, Series A",
+       volume = "37",
+       number = "1",
+       pages = "61--68",
+       year = "1984",
+       note = "",
+       issn = "0097-3165",
+       doi = "10.1016/0097-3165(84)90019-0",
+       url = "http://www.sciencedirect.com/science/article/pii/0097316584900190",
+       author = "Unjeng and Cheng"
+}
+
+@Book{ Knuth1998_1,
+       title = "The Art of Computer Programming, Volume 2: Seminumerical Algorithms",
+       author = "D. E. Knuth",
+       editor = "Reading and Mass and {third edition}",
+       publisher = "Addison-Wesley",
+       year = "1997",
+       series = "Section 3.2.1: The Linear Congruential Method",
+       edition = "Third Edition",
+       volume = "2: Seminumerical Algorithms",
+       owner = "qianxue",
+       timestamp = "2010.02.05"
+}
+
 @Article{ Gonzalez2005281,
        title = "Statistical complexity measure of pseudorandom bit generators",
        journal = "Physica A: Statistical Mechanics and its Applications",
        year = "1996"
 }
 
+@Book{ Deborah1998,
+       title = "Randomness",
+       author = "Deborah J. Bennett",
+       publisher = "Harvard University Press",
+       year = "1998"
+}
+
+@Book{ Kallenberg1986,
+       title = "Random Measures, 4th ed.",
+       author = "Olav Kallenberg",
+       publisher = "Academic Press",
+       address = "New York, London; Akademie-Verlag, Berlin,",
+       edition = "MR0854102",
+       year = "1986"
+}
+
+@Book{ William2007,
+       title = "Numerical Recipes: The Art of Scientific Computing (3rd ed.)",
+       series = "Chapter 7. Random Numbers",
+       author = "William H. Press",
+       publisher = "New York: Cambridge University Press",
+       year = "2007"
+}
+
+@InCollection{ Pashley2010184,
+       title = "Generating Random Numbers",
+       editor = "Editors-in-Chief: Penelope Peterson and Eva Baker and Barry McGaw",
+       booktitle = "International Encyclopedia of Education (Third Edition)",
+       publisher = "Elsevier",
+       edition = "Third Edition",
+       address = "Oxford",
+       year = "2010",
+       pages = "184--189",
+       isbn = "978-0-08-044894-7",
+       doi = "10.1016/B978-0-08-044894-7.01375-0",
+       url = "http://www.sciencedirect.com/science/article/pii/B9780080448947013750",
+       author = "P.J. Pashley and A. Amodeo",
+       keywords = "Composite generator",
+       keywords1 = "Deterministic generation",
+       keywords10 = "Shuffling",
+       keywords11 = "Simulation",
+       keywords12 = "Tests of randomness",
+       keywords13 = "Uniform variates",
+       keywords2 = "Generation efficiency",
+       keywords3 = "Multiplicative congruential generator",
+       keywords4 = "Physical generation",
+       keywords5 = "Portability",
+       keywords6 = "Random number generator",
+       keywords7 = "Random sequences",
+       keywords8 = "Reproducibility",
+       keywords9 = "Sequence period"
+}
+
+@Book{ Tippett1927,
+       title = "Random Sampling Numbers",
+       author = "L.H.C. Tippett",
+       publisher = "CUP",
+       year = "1927",
+       address = "London"
+}
+
+@Article{ Danger2009,
+       title = "High speed true random number generator based on open loop structures in FPGAs",
+       author = "J.-L. Danger and S. Guilley and P. Hoogvorst",
+       publisher = "Microelectronics Journal",
+       journal = "Microelectronics Journal",
+       pages = "1650--1656",
+       volume = "40",
+       number = "11",
+       year = "November 2009"
+}
+
+@Article{ JarosawAdam2011,
+       title = "Generating and using truly random quantum states in Mathematica",
+       journal = "Computer Physics Communications",
+       volume = "",
+       number = "0",
+       pages = "--",
+       year = "2011",
+       note = "",
+       issn = "0010-4655",
+       doi = "10.1016/j.cpc.2011.08.002",
+       url = "http://www.sciencedirect.com/science/article/pii/S0010465511002748",
+       author = "Jaros{\l}aw Adam and Miszczak",
+       keywords = "Random density matrices",
+       keywords1 = "Quantum information",
+       keywords2 = "Quantum random number generators"
+}
+
+@Article{ Tan20091618,
+       title = "Randomness quality of permuted pseudorandom binary sequences",
+       journal = "Mathematics and Computers in Simulation",
+       volume = "79",
+       number = "5",
+       pages = "1618--1626",
+       year = "2009",
+       note = "",
+       issn = "0378-4754",
+       doi = "10.1016/j.matcom.2008.07.012",
+       url = "http://www.sciencedirect.com/science/article/pii/S0378475408002486",
+       author = "Syn Kiat Tan and Sheng-Uei Guan",
+       keywords = "Pseudorandom number generation",
+       keywords1 = "DIEHARD testing",
+       keywords2 = "Linear finite state machine",
+       keywords3 = "Cellular automata"
+}
+
+@InCollection{ StDenis200691,
+       title = "Chapter 3 - Random Number Generation",
+       editor = "",
+       booktitle = "Cryptography for Developers",
+       publisher = "Syngress",
+       edition = "",
+       address = "Burlington",
+       year = "2006",
+       pages = "91--137",
+       isbn = "978-1-59749-104-4",
+       doi = "10.1016/B978-159749104-4/50006-6",
+       url = "http://www.sciencedirect.com/science/article/pii/B9781597491044500066",
+       author = "Tom St Denis and Simon Johnson"
+}
+
+@InBook{ Klapper1994,
+       title = "2-adic shift registers, in: R. Anderson (Ed.)
+, Fast Software Encryption",
+       author = "Klapper
+A. and Goresky
+M.",
+       publisher = "Lecture
+Notes in Computer Science
+",
+       pages = "174--178",
+       volume = "809",
+       year = "1994"
+}
+
+@Article{ DBLP1986,
+       author = "Lenore Blum and Manuel Blum and Mike Shub",
+       title = "A Simple Unpredictable Pseudo-Random Number Generator",
+       journal = "SIAM J. Comput.",
+       volume = "15",
+       number = "2",
+       year = "1986",
+       pages = "364--383",
+       bibsource = "DBLP, http://dblp.uni-trier.de",
+       ee = "http://dx.doi.org/10.1137/0215025"
+}
+
+@Book{ DBLP2003,
+       author = "Niels Ferguson and Bruce Schneier",
+       title = "Practical cryptography",
+       publisher = "Wiley",
+       year = "2003",
+       isbn = "978-0-471-22357-3",
+       pages = "I--XX, 1--410",
+       bibsource = "DBLP, http://dblp.uni-trier.de"
+}
+
+@Article{ Matsumoto1998,
+       author = "Makoto Matsumoto and Takuji Nishimura",
+       title = "Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator",
+       journal = "ACM Trans. Model. Comput. Simul.",
+       volume = "8",
+       month = "January",
+       year = "1998",
+       issn = "1049-3301",
+       pages = "3--30",
+       url = "http://doi.acm.org/10.1145/272991.272995",
+       doi = "http://doi.acm.org/10.1145/272991.272995",
+       publisher = "ACM",
+       address = "New York, NY, USA",
+       keywords = "finite fields, GFSR, incomplete array, inversive-decimation method, k-distribution, Mersenne primes, Mersenne twister, m-sequences, MT19937, multiple-recursive matrix method, primitive polynomials, random number generation, tempering, TGFSR",
+       acmid = "272995",
+       issue = "1",
+       numpages = "28"
+}
+
+@Book{ Miller2010,
+       author = "Frederic P. Miller and Agnes F. Vandome and John McBrewster",
+       title = "Cryptographically Secure Pseudorandom Number Generator",
+       year = "2010",
+       isbn = "6130875185, 9786130875183",
+       publisher = "Alpha Press"
+}
+
+@InCollection{ springerlink1994,
+       author = "Joan Daemen and Ren{\'e} Govaerts and Joos Vandewalle",
+       title = "Resynchronization Weaknesses in Synchronous Stream Ciphers",
+       booktitle = "Advances in Cryptology — EUROCRYPT ’93",
+       series = "Lecture Notes in Computer Science",
+       editor = "Tor Helleseth",
+       publisher = "Springer Berlin / Heidelberg",
+       isbn = "978-3-540-57600-6",
+       pages = "159--167",
+       volume = "765",
+       url = "http://dx.doi.org/10.1007/3-540-48285-7_14",
+       note = "10.1007/3-540-48285-7\_14",
+       year = "1994",
+       affiliation = "Katholieke Universiteit Leuven Laboratorium ESAT Kardinaal Mercierlaan 94 B-3001 Heverlee Belgium",
+       keyword = "Computer Science"
+}
+
+@Article{ PhysRevA2004,
+       title = "Secure direct communication with a quantum one-time pad",
+       month = "May",
+       journal = "Phys. Rev. A",
+       doi = "10.1103/PhysRevA.69.052319",
+       author = "Fu-Guo Deng and Gui Lu Long",
+       year = "2004",
+       url = "http://link.aps.org/doi/10.1103/PhysRevA.69.052319",
+       publisher = "American Physical Society",
+       pages = "052319",
+       volume = "69",
+       issue = "5",
+       numpages = "4"
+}
+
+@InProceedings{ Wu2008,
+       author = "Keke Wu and Huiyun Li and Bo Peng and Fengqi Yu",
+       title = "Correlation Power Analysis Attack against Synchronous Stream Ciphers",
+       booktitle = "Proceedings of the 2008 The 9th International Conference for Young Computer Scientists",
+       year = "2008",
+       isbn = "978-0-7695-3398-8",
+       pages = "2067--2072",
+       numpages = "6",
+       url = "http://dl.acm.org/citation.cfm?id=1491263.1492074",
+       doi = "10.1109/ICYCS.2008.8",
+       acmid = "1492074",
+       publisher = "IEEE Computer Society",
+       address = "Washington, DC, USA",
+       keywords = "Correlation coefficient, CPA, DPA, Synchronous stream ciphers, Side channel analysis"
+}
+
+@InProceedings{ Daemen1994,
+       author = "Joan Daemen and Ren{\'e} Govaerts and Joos Vandewalle",
+       title = "Resynchronization weaknesses in synchronous stream ciphers",
+       booktitle = "Workshop on the theory and application of cryptographic techniques on Advances in cryptology",
+       series = "EUROCRYPT '93",
+       year = "1994",
+       isbn = "3-540-57600-2",
+       location = "Lofthus, Norway",
+       pages = "159--167",
+       url = "http://dl.acm.org/citation.cfm?id=188307.188337",
+       publisher = "Springer-Verlag New York, Inc.",
+       address = "Secaucus, NJ, USA",
+       acmid = "188337",
+       numpages = "9"
+}
+
+@Book{ cusick2004stream,
+       title = "Stream ciphers and number theory",
+       author = "T.W. Cusick and C. Ding and A. Renvall",
+       isbn = "9780444516312",
+       series = "North-Holland mathematical library",
+       url = "http://books.google.com/books?id=Q2IncJ99wacC",
+       year = "2004",
+       publisher = "Elsevier",
+       lccn = "2004040484"
+}
+
+@Book{ Meyer100035,
+       author = "Carl H Meyer and Stephen M Matyas",
+       title = "Cryptography: a new dimension in computer data security; a guide for the design and implementation of secure systems",
+       publisher = "Wiley",
+       address = "New York, NY",
+       year = "1982"
+}
+
+@Book{ schneier1996,
+       title = "Applied cryptography: protocols, algorithms, and source code in C",
+       author = "Schneier B.",
+       isbn = "9780471128458",
+       url = "http://books.google.com/books?id=6NdQAAAAMAAJ",
+       year = "1996",
+       publisher = "Wiley",
+       lccn = "95012398"
+}
+
+@Article{ STMAZ01769371,
+       author = "Toni Stojanovski and Johnny Pihl and Ljup\u{c}o Kocarev",
+       title = "Chaos-based random number generators.",
+       year = "2001",
+       journal = "IEEE Transactions on Circuits and Systems. I: Fundamental Theory and Applications",
+       volume = "48",
+       number = "3",
+       issn = "1057-7122",
+       pages = "382--385",
+       publisher = "Institute of Electrical and Electronics Engineers, Inc., New York, NY",
+       doi = "10.1109/81.915396",
+       abstract = "Summary: This paper and its companion [Part I, {\it T. Stojanovski} and {\it L. M. Kocarev}, ibid. 48, No. 3, 281-288 (2001; reviewed above)] are devoted to the analysis of the application of a chaotic piecewise-linear one-dimensional (PL1D) map as random number generator (RNG). In Part I, we have mathematically analyzed the information generation process of a class of PL1D maps. In this paper, we find optimum parameters that give an RNG with lowest redundancy and maximum margin against parasitic attractors. Further, the map is implemented in a 0.8 $\mu$m standard CMOS process utilizing switched current techniques. Post-layout circuit simulations of the RNG indicate no periodic attractors over variations in temperature, power supply and process conditions, and maximum redundancy of $0.4\%$. We estimate that the output bit rate of our RNG is 1 Mbit/s, which is substantially higher than the output bit rate of RNGs available on the market.",
+       identifier = "0997.65003",
+       msc2010 = "65C10 (94C05 62P20 94A15 62B10)"
+}
+