ALGORITMO DE CIFRADO SIMÉTRICO BASADO EN MAPEO LOGÍSTICO Y TRANSFORMADA RÁPIDA DE FOURIER
Resumen
Texto completo:
1526-1543 PDFReferencias
S. Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. 1999. Anchor Books.
D. Kahn, The Codebreakers - The Story of Secret Writing. 1996. revised ed. Scribner.
N. Aaseng, Navajo Code Talkers: Americas Secret Weapon in World War II. 1992. Walker & Company. New York.
M. Mogollon, Cryptography and security services: mechanisms and applications. 2007. Hershey, PA: CyberTech. Pp. 51-97.
B. Rajan, P. Saumitr, “A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system”. IEEE Transactions on circuits and system. Vol. 4. 2006. Pp. I- 53.
M. Jiménez, F. Flores, G. González, “System for Information Encryption Implementing Several Chaotic Orbits”. Ingeniería, Investigación y Tecnología. Vol. 16. Issue 3. 2015. Pp. 335-343.
Radwan, S. AbdElHaleem, S. Abd-El-Hafiz, “Symmetric encryption algorithms using chaotic and non-chaotic generators: A review”. Journal of Advanced Research. Vol. 7. No. 2. 2016. Pp. 193–208.
F. Li, B. Luo, P. Liu, “Secure information aggregation for smart grids using homomorphic encryption”. First IEEE international conference on Smart Grid Communications (SmartGridComm). Pp. 327–332.
Kerckhoffs, “La cryptographie militaire, Journal des sciences militaires”. Vol. 9. 1983. Pp. 161-191.
Rottondi, G. Verticale, “Privacy-friendly load scheduling of deferrable and interruptible domestic appliances in Smart Grids”. Computer Communications. Vol. 58. No. 1. 2015. Pp. 29–39.
Engel, Wavelet-based load profile representation for smart meter privacy. Innovator Smart Grid Technologies (ISGT), IEEE PES. 2013. Pp. 1-6.
McKenna, I. Richardson, M. Thomson, “Smart meter data: Balancing consumer privacy concerns with legitimate applications”. Energy Policy. Vol. 41. 2012. Pp. 807-814.
S. Zeadally, A. S.K. Pathan, C. Alcaraz, M. Badra, “Towards privacy protection in smart grid”. Wireless personal communications. Vol. 73. No. 1. 2013. Pp. 23-50.
H. Hennawy, A. Omar, S. Kholaif, “LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm”. Ain Shams Engineering Journal. Vol. 6. No. 1. 2015. Pp. 57-65.
Shannon, A mathematical theory of communication. 1948. Bell Syst. Tech. Pp. 27, 379–423, 623–656.
S. Kumar, K. Abhishek, M. Singh, “Accessing Relevant and Accurate Information using Entropy”. Procedia Computer Science. 2015. Pp. 54, 449-455.
Shannon, Teoría de la Comunicación de Secrecy Systems. Bell Tech System. Vol. 28. 1949. Pp. 656-715.
Rao Logistic Map: A Possible Random Number Generator. http://arXiv.org/abs/cond-mat/9310004v1
R. May, Simple Mathematical Models with Very Complicated Dynamics, Nature. 1976. Pp. 261, 459-467.
M. François, T. Grosges, D. Barchiesi, R. Erra, “Pseudo-random number generator based on mixing of three chaotic maps”. Communications in Nonlinear Science and Numerical Simulation. Vol. 19. No. 4. 2014. Pp.887-895.
URL de la licencia: https://creativecommons.org/licenses/by/3.0/deed.es
Pistas Educativas está bajo la Licencia Creative Commons Atribución 3.0 No portada.
TECNOLÓGICO NACIONAL DE MÉXICO / INSTITUTO TECNOLÓGICO DE CELAYA
Antonio García Cubas Pte #600 esq. Av. Tecnológico, Celaya, Gto. México
Tel. 461 61 17575 Ext 5450 y 5146
pistaseducativas@itcelaya.edu.mx