{"title":"插入混沌序列密码学及支持软件的研究","authors":"Yin Yang, Cao Jian-Fu","doi":"10.1109/WCICA.2004.1340491","DOIUrl":null,"url":null,"abstract":"In allusion to the bug of some chaotic cryptography, brought forward a new data cryptology, which used the bidimensional inserted chaotic-sequence code. The encrypted effect and the capability of resisted to the attack are analyzed. The crossing-platform software was developed based on the component's architecture.","PeriodicalId":331407,"journal":{"name":"Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788)","volume":"22 7","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Inserted chaotic-sequence cryptography and supported software's investigation\",\"authors\":\"Yin Yang, Cao Jian-Fu\",\"doi\":\"10.1109/WCICA.2004.1340491\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In allusion to the bug of some chaotic cryptography, brought forward a new data cryptology, which used the bidimensional inserted chaotic-sequence code. The encrypted effect and the capability of resisted to the attack are analyzed. The crossing-platform software was developed based on the component's architecture.\",\"PeriodicalId\":331407,\"journal\":{\"name\":\"Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788)\",\"volume\":\"22 7\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-06-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WCICA.2004.1340491\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCICA.2004.1340491","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Inserted chaotic-sequence cryptography and supported software's investigation
In allusion to the bug of some chaotic cryptography, brought forward a new data cryptology, which used the bidimensional inserted chaotic-sequence code. The encrypted effect and the capability of resisted to the attack are analyzed. The crossing-platform software was developed based on the component's architecture.