[1] Sneyers, R. (1997) Climate Chaotic Instability: Statistical Determination and Theoretical Background. Environmetrics, 8, 517-532.
http://dx.doi.org/10.1002/(SICI)1099-095X(199709/10)8:5<517::AID-ENV267>3.0.CO;2-L
[2] Zeng, X., Pielke, R.A. and Eykholt, R. (1993) Chaos Theory and Its Application to the Atmosphere. Bulletin of the American Meteorological Society, 74, 631-639.
http://dx.doi.org/10.1175/1520-0477(1993)074<0631:CTAIAT>2.0.CO;2
[3] Wikipedia. Chaos Theory. Cited 17 January 2009.
http://en.wikipedia.org/w/index.php?title=Chaos_theory&oldid=264934743
[4] Serletis, A. and Gogas, P. (2000) Purchasing Power Parity, Nonlinearity and Chaos. Applied Financial Economics, 10, 615-622.
http://dx.doi.org/10.1080/096031000437962
[5] Serletis, A. and Gogas, P. (1997) Chaos in East European Black Market Exchange Rates. Research in Economics, 51, 359-385.
http://dx.doi.org/10.1006/reec.1997.0050
[6] Wikipedia (2015) Chaos Theory.
https://en.wikipedia.org/w/index.php?title=Chaos_theory&oldid=693847517
[7] Maqableh, M., Samsudin, A.B. and Alia, M.A. (2008) New Hash Function Based on Chaos Theory (CHA-1). IJCSNS International Journal of Computer Science and Network Security, 8, 20-26.
[8] Kocarev, L. (2001) Chaos-Based Cryptography: A Brief Overview. IEEE Circuits and Systems Magazine, 1, 6-21.
http://dx.doi.org/10.1109/7384.963463
[9] Pareek, N.K., Patidar, V. and Sud, K.K. (2003) Discrete Chaotic Cryptography Using External Key. Physics Letters A, 309, 75-82.
http://dx.doi.org/10.1016/S0375-9601(03)00122-1
[10] Pareek, N.K., Patidar, V. and Sud, K.K. (2005) Cryptography Using Multiple One-Dimensional Chaotic Maps. Communications in Nonlinear Science and Numerical Simulation, 10, 715-723.
http://dx.doi.org/10.1016/j.cnsns.2004.03.006
[11] Xiang, T., Liao, X.F., Tang, G.P., Chen, Y. and Wong, K.W. (2006) A Novel Block Cryptosystem Based on Iterating a Chaotic Map. Physics Letters A, 349, 109-115.
http://dx.doi.org/10.1016/j.physleta.2005.02.083
[12] Chen, S., Zhong, X.X. and Wu, Z.Z. (2008) Chaos Block Cipher for Wireless Sensor Network. Science in China Series F: Information Sciences, 51, 1055-1063.
http://dx.doi.org/10.1007/s11432-008-0102-5
[13] Peng, J., You, M.Y., Yang, Z.M. and Jin, S.Z. (2007) Research on a Block Encryption Cipher Based on Chaotic Dynamical System. 3rd International Conference on Natural Computation, ICNC 2007, Haikou, 24-27 August 2007, 744-748.
http://dx.doi.org/10.1109/ICNC.2007.612
[14] Yang, H.Q., Liao, X.F., Wong, K.W., Zhang, W. and Wei, P.C. (2007) A New Block Cipher Based on Chaotic Map and Group Theory. Chaos, Solitons & Fractals, 40, 50-59.
http://dx.doi.org/10.1016/j.chaos.2007.07.056
[15] Peng, J., Jin, S.Z., Chen, G.R., Yang, Z.M. and Liao, X.F. (2008) An Image Encryption Scheme Based on Chaotic Map. 4th International Conference on Natural Computation, ICNC ’08, Jinan, 18-20 October 2008, 595-599.
http://dx.doi.org/10.1109/icnc.2008.227
[16] Lian, S. (2009) A Block Cipher Based on Chaotic Neural Networks. Neurocomputing, 72, 1296-1301.
http://dx.doi.org/10.1016/j.neucom.2008.11.005
[17] Wang, F.J., Zhang, Y.P. and Cao, T.J. (2009) Research of Chaotic Block Cipher Algorithm Based on Logistic Map. 2nd International Conference on Intelligent Computation Technology and Automation, 2009, ICICTA ’09, Changsha, 10-11 October 2009, 678-681.
http://dx.doi.org/10.1109/ICICTA.2009.169
[18] Peng, J., Jin, S.Z., Liu, H.L. and Liu, Y.G. (2009) A Block Cipher Based on a Hybrid of Chaotic System and Feistel Network. 5th International Conference on Natural Computation, ICNC ’09, Tianjin, 14-16 August 2009, 427-431.
http://dx.doi.org/10.1109/icnc.2009.663
[19] Amin, M., Faragallah, O.S. and Abd El-Latif, A.A. (2010) A Chaotic Block Cipher Algorithm for Image Cryptosystems. Communications in Nonlinear Science and Numerical Simulation, 15, 3484-3497.
http://dx.doi.org/10.1016/j.cnsns.2009.12.025
[20] Huang, J.-H. and Liu, Y. (2010) A Block Encryption Algorithm Combined with the Logistic Mapping and SPN Structure. 2010 2nd International Conference on Industrial and Information Systems (IIS), Dalian, 10-11 July 2010, 156-159.
http://dx.doi.org/10.1109/indusis.2010.5565655
[21] Zhao, G., Chen, G.R., Fang, J.Q. and Xu, G. (2011) Block Cipher Design: Generalized Single-Use-Algorithm Based on Chaos. Tsinghua Science & Technology, 16, 194-206.
http://dx.doi.org/10.1016/S1007-0214(11)70030-X
[22] Masuda, N., Jakimoski, G., Aihara, K. and Kocarev, L. (2006) Chaotic Block Ciphers: From Theory to Practical Algorithms. IEEE Transactions on Circuits and Systems I: Regular Papers, 53, 1341-1352.
http://dx.doi.org/10.1109/TCSI.2006.874182
[23] Habutsu, T., Nishio, Y., Sasase, I. and Mori, S. (1991) A Secret Key Cryptosystem by Iterating a Chaotic Map. In: Davies, D.W., Ed., Advances in Cryptology—EUROCRYPT ’91, Springer, Berlin, 127-140.
http://dx.doi.org/10.1007/3-540-46416-6_11
[24] Gutowitz, H.A. (1993) Cryptography with Dynamical Systems, in Cellular Automata and Cooperative Phenomena. Kluwer Academic Press, Dordrecht.
http://dx.doi.org/10.1007/978-94-011-1691-6_21
[25] Kotulski, Z. and Szczepanski, J. (1997) Discrete Chaotic Cryptography (DCC). Annalen der Physik, 6, 381-394.
http://dx.doi.org/10.1002/andp.19975090504
[26] García, P. and Jiménez, J. (2002) Communication through Chaotic Map Systems. Physics Letters A, 298, 35-40.
http://dx.doi.org/10.1016/S0375-9601(02)00382-1
[27] Masuda, N. and Aihara, K. (2002) Cryptosystems with Discretized Chaotic Maps. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 49, 28-40.
http://dx.doi.org/10.1109/81.974872
[28] Baptista, M.S. (1998) Cryptography with Chaos. Physics Letters A, 240, 50-54.
http://dx.doi.org/10.1016/S0375-9601(98)00086-3
[29] Wong, W.-K., Lee, L.-P. and Wong, K.-W. (2001) A Modified Chaotic Cryptographic Method. Computer Physics Communications, 138, 234-236.
http://dx.doi.org/10.1016/S0010-4655(01)00220-X
[30] Alvarez, E., Fernández, A., Garcia, P., Jiménez, J. and Marcano, A. (1999) New Approach to Chaotic Encryption. Physics Letters A, 263, 373-375.
http://dx.doi.org/10.1016/S0375-9601(99)00747-1
[31] Wong, K.W. (2002) A Fast Chaotic Cryptographic Scheme with Dynamic Look-Up Table. Physics Letters A, 298, 238-242.
http://dx.doi.org/10.1016/S0375-9601(02)00431-0
[32] Machado, R.F., Baptista, M.S. and Grebogi, C. (2004) Cryptography with Chaos at the Physical Level. Chaos, Solitons & Fractals, 21, 1265-1269.
http://dx.doi.org/10.1016/j.chaos.2003.12.094
[33] Guan, Z.-H., Huang, F. and Guan, W. (2005) Chaos-Based Image Encryption Algorithm. Physics Letters A, 346, 153-157.
http://dx.doi.org/10.1016/j.physleta.2005.08.006
[34] Gao, T. and Chen, Z. (2008) Image Encryption Based on a New Total Shuffling Algorithm. Chaos, Solitons & Fractals, 38, 213-220.
http://dx.doi.org/10.1016/j.chaos.2006.11.009
[35] Wong, K.W. (2003) A Combined Chaotic Cryptographic and Hashing Scheme. Physics Letters A, 307, 292-298.
http://dx.doi.org/10.1016/S0375-9601(02)01770-X
[36] Xiao, D., Liao, X. and Deng, S. (2005) One-Way Hash Function Construction Based on the Chaotic Map with Changeable-Parameter. Chaos, Solitons & Fractals, 24, 65-71. http://dx.doi.org/10.1016/S0960-0779(04)00456-4
[37] Lian, S.G., Liu, Z.X., Ren, Z. and Wang, H.L. (2006) Hash Function Based on Chaotic Neural Networks. 2006 IEEE International Symposium on Circuits and Systems, ISCAS 2006, Island of Kos, 21-24 May 2006.
http://dx.doi.org/10.1109/iscas.2006.1692566
[38] Peng, F. and Qiu, S.-S. (2007) One-Way Hash Functions Based on Iterated Chaotic Systems. International Conference on Communications, Circuits and Systems, ICCCAS 2007, Kokura, 11-13 July 2007, 1070-1074.
http://dx.doi.org/10.1109/ICCCAS.2007.4348231
[39] Khan, M.K., Zhang, J. and Wang, X. (2008) Chaotic Hash-Based Fingerprint Biometric Remote User Authentication Scheme on Mobile Devices. Chaos, Solitons & Fractals, 35, 519-524.
http://dx.doi.org/10.1016/j.chaos.2006.05.061
[40] Xiao, D., Liao, X. and Deng, S. (2008) Parallel Keyed Hash Function Construction Based on Chaotic Maps. Physics Letters A, 372, 4682-4688.
http://dx.doi.org/10.1016/j.physleta.2008.04.060
[41] Song, Y.R. and Jiang, G.P. (2008) Hash Function Construction Based on Chaotic Coupled Map Network. The 9th International Conference for Young Computer Scientists, ICYCS 2008, Hunan, 18-21 November 2008, 2753-2758.
http://dx.doi.org/10.1109/ICYCS.2008.134
[42] Deng, S., Xiao, D., Li, Y.T. and Peng, W.B. (2009) A Novel Combined Cryptographic and Hash Algorithm Based on Chaotic Control Character. Communications in Nonlinear Science and Numerical Simulation, 14, 3889-3900.
http://dx.doi.org/10.1016/j.cnsns.2009.02.020
[43] Guyeux, C. and Bahi, J.M. (2010) Topological Chaos and Chaotic Iterations Application to Hash Functions. The 2010 International Joint Conference on Neural Networks (IJCNN), Barcelona, 18-23 July 2010, 1-7.
http://dx.doi.org/10.1109/ijcnn.2010.5596512
[44] Huang, Z. (2011) A More Secure Parallel Keyed Hash Function Based on Chaotic Neural Network. Communications in Nonlinear Science and Numerical Simulation, 16, 3245-3256. http://dx.doi.org/10.1016/j.cnsns.2010.12.009
[45] Wang, Y., Wong, K.-W. and Xiao, D. (2011) Parallel Hash Function Construction Based on Coupled Map Lattices. Communications in Nonlinear Science and Numerical Simulation, 16, 2810-2821.
http://dx.doi.org/10.1016/j.cnsns.2010.10.001
[46] Yi, X. (2005) Hash Function Based on Chaotic Tent Maps. IEEE Transactions on Circuits and Systems II: Express Briefs, 52, 354-357.
http://dx.doi.org/10.1109/TCSII.2005.848992
[47] Zhang, J., Wang, X. and Zhang, W. (2007) Chaotic Keyed Hash Function Based on Feedforward-Feedback Nonlinear Digital Filter. Physics Letters A, 362, 439-448.
http://dx.doi.org/10.1016/j.physleta.2006.10.052
[48] Amin, M., Faragallah, O.S. and Abd El-Latif, A.A. (2009) Chaos-Based Hash Function (CBHF) for Cryptographic Applications. Chaos, Solitons & Fractals, 42, 767-772.
http://dx.doi.org/10.1016/j.chaos.2009.02.001
[49] Xiao, D., Shih, F.Y. and Liao, X. (2010) A Chaos-Based Hash Function with both Modification Detection and Localization Capabilities. Communications in Nonlinear Science and Numerical Simulation, 15, 2254-2261.
http://dx.doi.org/10.1016/j.cnsns.2009.10.012
[50] Kocarev, L. and Jakimoski, G. (2003) Pseudorandom Bits Generated by Chaotic Maps. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 50, 123-126.
http://dx.doi.org/10.1109/TCSI.2002.804550
[51] Tong, X.-J., Cui, M.-G. and Jiang, W. (2006) The Production Algorithm of Pseudo-Random Number Generator Based on Compound Non-Linear Chaos System. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2006, IIH-MSP ’06, Pasadena, 18-20 December 2006, 685-688.
http://dx.doi.org/10.1109/IIH-MSP.2006.265094
[52] Chen, S. and Zhong, X.-X. (2007) Chaotic Block Iterating Method for Pseudo-Random Sequence Generator. The Journal of China Universities of Posts and Telecommunications, 14, 45-48.
http://dx.doi.org/10.1016/s1005-8885(07)60054-5
[53] Zheng, F., Tian, X.-J., Song, J.-Y. and Li, X.-Y. (2008) Pseudo-Random Sequence Generator Based on the Generalized Henon Map. The Journal of China Universities of Posts and Telecommunications, 15, 64-68.
http://dx.doi.org/10.1016/S1005-8885(08)60109-0
[54] Qi, A.X., Han, C.Y. and Wang, G.Y. (2010) Design and FPGA Realization of a Pseudo Random Sequence Generator Based on a Switched Chaos. International Conference on Communications, Circuits and Systems (ICCCAS), Chengdu, 28-30 July 2010, 417-420.
http://dx.doi.org/10.1109/ICCCAS.2010.5581965
[55] Yoon, J.W. and Kim, H. (2010) An Image Encryption Scheme with a Pseudorandom Permutation Based on Chaotic Maps. Communications in Nonlinear Science and Numerical Simulation, 15, 3998-4006.
http://dx.doi.org/10.1016/j.cnsns.2010.01.041
[56] Dabal, P. and Pelka, R. (2011) A Chaos-Based Pseudo-Random Bit Generator Implemented in FPGA Device. 2011 IEEE 14th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS), Cottbus, 13-15 April 2011, 151-154.
http://dx.doi.org/10.1109/ddecs.2011.5783069
[57] Forré, R. (1991) The Hénon Attractor as a Keystream Generator. In: Davies, D.W., Ed., Advances in Cryptology—EUROCRYPT ’91, Springer, Berlin, 76-81.
[58] Matthews, R.A.J. (1989) On the Derivation of a “Chaotic” Encryption Algorithm. Cryptologia, 13, 29-42.
http://dx.doi.org/10.1080/0161-118991863745
[59] Li, S., Mou, X. and Cai, Y. (2001) Improving Security of a Chaotic Encryption Approach. Physics Letters A, 290, 127-133.
http://dx.doi.org/10.1016/S0375-9601(01)00612-0
[60] Wolfram, S. (1985) Cryptography with Cellular Automata. In: Williams, H.C., Ed., Advances in Cryptology— CRYPTO ’85 Proceedings, Lecture Notes in Computer Science, Spinger-Verlag, Berlin, 429-432.
[61] Lee, P.-H., Pei, S.-C. and Chen, Y.-Y. (2003) Generating Chaotic Stream Ciphers Using Chaotic Systems. Chinese Journal of Physics, 41, 559-581.
[62] Sang, T., Wang, R. and Yan, Y. (2000) Constructing Chaotic Discrete Sequences for Digital Communications Based on Correlation Analysis. IEEE Transactions on Signal Processing, 48, 2557-2565.
http://dx.doi.org/10.1109/78.863058
[63] Kwok, H.S. and Tang, W.K.S. (2007) A Fast Image Encryption System Based on Chaotic Maps with Finite Precision Representation. Chaos, Solitons & Fractals, 32, 1518-1529.
http://dx.doi.org/10.1016/j.chaos.2005.11.090
[64] Patidar, V., Pareek, N.K. and Sud, K.K. (2009) A New Substitution-Diffusion Based Image Cipher Using Chaotic Standard and Logistic Maps. Communications in Nonlinear Science and Numerical Simulation, 14, 3056-3075.
http://dx.doi.org/10.1016/j.cnsns.2008.11.005
[65] Patidar, V., Pareek, N.K., Purohit, G. and Sud, K.K. (2010) Modified Substitution-Diffusion Image Cipher Using Chaotic Standard and Logistic Maps. Communications in Nonlinear Science and Numerical Simulation, 15, 2755-2765.
http://dx.doi.org/10.1016/j.cnsns.2009.11.010
[66] Biham, E. (1991) Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT’91. In: Davies, D.W., Ed., Advances in Cryptology—EUROCRYPT ’91, Springer, Berlin, 532-534.
http://dx.doi.org/10.1007/3-540-46416-6_49
[67] Wheeler, D.D. (1989) Problems with Chaotic Cryptosystems. Cryptologia, 13, 243-250.
http://dx.doi.org/10.1080/0161-118991863934
[68] Alvarez, G., Montoya, F., Romera, M. and Pastor, G. (2000) Cryptanalysis of a Chaotic Encryption System. Physics Letters A, 276, 191-196.
http://dx.doi.org/10.1016/S0375-9601(00)00642-3
[69] Alvarez, G., Montoya, F., Romera, M. and Pastor, G. (2003) Cryptanalysis of a Discrete Chaotic Cryptosystem Using External Key. Physics Letters A, 319, 334-339.
http://dx.doi.org/10.1016/j.physleta.2003.10.044
[70] Wei, J., Liao, X.F., Wong, K.W. and Zhou, T. (2007) Cryptanalysis of a Cryptosystem Using Multiple One-Dimensional Chaotic Maps. Communications in Nonlinear Science and Numerical Simulation, 12, 814-822.
http://dx.doi.org/10.1016/j.cnsns.2005.06.001
[71] Li, C.Q., Li, S.J., Alvarez, G., Chen, G.R. and Lo, K.-T. (2008) Cryptanalysis of a Chaotic Block Cipher with External Key and Its Improved Version. Chaos, Solitons & Fractals, 37, 299-307.
http://dx.doi.org/10.1016/j.chaos.2006.08.025
[72] Wang, X. and Yu, C. (2009) Cryptanalysis and Improvement on a Cryptosystem Based on a Chaotic Map. Computers & Mathematics with Applications, 57, 476-482.
http://dx.doi.org/10.1016/j.camwa.2008.09.042
[73] Yang, J., Xiao, D. and Xiang, T. (2011) Cryptanalysis of a Chaos Block Cipher for Wireless Sensor Network. Communications in Nonlinear Science and Numerical Simulation, 16, 844-850.
http://dx.doi.org/10.1016/j.cnsns.2010.05.005
[74] álvarez, G., Montoya, F., Romera, M. and Pastor, G. (2004) Keystream Cryptanalysis of a Chaotic Cryptographic Method. Computer Physics Communications, 156, 205-207.
http://dx.doi.org/10.1016/S0010-4655(03)00432-6
[75] Jakimoski, G. and Kocarev, L. (2001) Analysis of Some Recently Proposed Chaos-Based Encryption Algorithms. Physics Letters A, 291, 381-384.
http://dx.doi.org/10.1016/S0375-9601(01)00771-X
[76] Li, S.J., Mou, X.Q., Ji, Z., Zhang, J.H. and Cai, Y.L. (2003) Performance Analysis of Jakimoski-Kocarev Attack on a Class of Chaotic Cryptosystems. Physics Letters A, 307, 22-28.
http://dx.doi.org/10.1016/S0375-9601(02)01659-6
[77] ?okal, C. and Solak, E. (2009) Cryptanalysis of a Chaos-Based Image Encryption Algorithm. Physics Letters A, 373, 1357-1360.
http://dx.doi.org/10.1016/j.physleta.2009.02.030
[78] Maqableh, M.M. and Dantchev, S. (2009) Cryptanalysis of Chaos-Based Hash Function (CBHF). 1st International Alternative Workshop on Aggressive Computing and Security—iAWACS, Laval, 23-25 October 2009, 20-30.
[79] Yang, Q.-T., Gao, T.-G., Fan, L. and Gu, Q.-L. (2009) Analysis of One-Way Alterable Length Hash Function Based on Cell Neural Network. 5th International Conference on Information Assurance and Security, IAS ’09, Xi’an, 18-20 August 2009, 391-395.
http://dx.doi.org/10.1109/ias.2009.87
[80] Xiao, D., Liao, X. and Wang, Y. (2009) Improving the Security of a Parallel Keyed Hash Function Based on Chaotic Maps. Physics Letters A, 373, 4346-4353.
http://dx.doi.org/10.1016/j.physleta.2009.09.059
[81] Deng, S., Li, Y. and Xiao, D. (2010) Analysis and Improvement of a Chaos-Based Hash Function Construction. Communications in Nonlinear Science and Numerical Simulation, 15, 1338-1347.
http://dx.doi.org/10.1016/j.cnsns.2009.05.065
[82] Li, C.Q., Li, S.J., Chen, G.R. and Halang, W.A. (2009) Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence. Image and Vision Computing, 27, 1035-1039.
http://dx.doi.org/10.1016/j.imavis.2008.09.004
[83] Rhouma, R., Solak, E. and Belghith, S. (2010) Cryptanalysis of a New Substitution-Diffusion Based Image Cipher. Communications in Nonlinear Science and Numerical Simulation, 15, 1887-1892.
http://dx.doi.org/10.1016/j.cnsns.2009.07.007
[84] Li, C., Li, S. and Lo, K.-T. (2011) Breaking a Modified Substitution-Diffusion Image Cipher Based on Chaotic Standard and Logistic Maps. Communications in Nonlinear Science and Numerical Simulation, 16, 837-843.
http://dx.doi.org/10.1016/j.cnsns.2010.05.008
[85] Maqableh, M.M. (2011) Fast Parallel Keyed Hash Functions Based on Chaotic Maps (PKHC). Western European Workshop on Research in Cryptology, Weimar, 20-22 July 2011, 33-40.
[86] Maqableh, M.M. (2010) Secure Hash Functions Based on Chaotic Maps for E-Commerce Application. International Journal of Information Technology and Management information System (IJITMIS), 1, 12-19.
[87] Maqableh, M.M. (2010) Fast Hash Function Based on BCCM Encryption Algorithm for E-Commerce (HFBCCM). 5th International Conference on e-Commerce in Developing Countries: With Focus on Export, Le Havre, 15-16 September 2010, 55-64.
[88] Bertuglia, C.S. and Vaio, F. (2005) Nonlinearity, Chaos & Complexity: The Dynamics of Natural and Social Systems. Oxford University Press.
[89] Alligood, K.T., Sauer, T.D. and Yorke, J.A. (1996) Chaos an Introduction to Dynamical Systems. Springer-Verlag, New York.
[90] Solari, H.G., Natiello, M.A. and Mindlin, G.B. (1996) Nonlinear Dynamics A Two-Way Trip from Physics to Math. Institute of Physics Publishing, Bristol.
[91] Baker, G.L. and Gollub, J.P. (1990) Chaotic Dynamics an Introduction. Press Syndicate of the University of Cambridge, New York.
[92] Poincaré, J.H. (1890) Sur le problème des trois corps et les équations de la dynamique. Divergence des séries de M. Lindstedt. Acta Mathematica, 13, 1-270.
[93] Lorenz, E.N. (1963) Deterministic Nonperiodic Flow. Journal of Atmospheric Sciences, 20, 130-141.
http://dx.doi.org/10.1175/1520-0469(1963)020<0130:dnf>2.0.co;2
[94] Pritchard, J. (1996) The Chaos Cookbook. Butterworh-Heinemann, Oxford.
[95] Rahimi, A., Mohammadi, S. and Rahimi, R. (2009) An Efficient Iris Authentication Using Chaos Theory-Based Cryptography for E-Commerce Transactions. International Conference for Internet Technology and Secured Transactions (ICITST 2009).
[96] Serletis, A. and Gogas, P. (1999) The North American Natural Gas Liquids Markets Are Chaotic. The Energy Journal, 20, 83-103.
http://dx.doi.org/10.5547/ISSN0195-6574-EJ-Vol20-No1-5
[97] Gilmore, R. (2004) Chaos and Attractors. Encyclopedia of Mathematical Physics, EMP MS 93.
[98] Tullaro, N.B., Abbott, T. and Reilly, J.P. (1992) An Experimental Approach to Nonlinear Dynamics and Chaos. Vol. 1, Addison-Wesley, Boston.
[99] Parker, T.S. and Chua, L.O. (1989) Practical Numerical Algorithms for Chaotic Systems. Springer-Verlag, New York.
http://dx.doi.org/10.1007/978-1-4612-3486-9
[100] Schmitz, R. (2001) Use of Chaotic Dynamical Systems in Cryptography. Journal of the Franklin Institute, 338, 429-441.
http://dx.doi.org/10.1016/S0016-0032(00)00087-9
[101] Maqableh, M.M. (2012) Analysis and Design Security Primitives Based on Chaotic Systems for eCommerce. Doctoral Thesis, Durham University, Durham.
[102] Grassi, G. and Mascoio, S. (1999) Synchronizing Hyperchaotic Systems by Observer Design. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, 46, 478-483.
http://dx.doi.org/10.1109/82.755422
[103] May, R.M. (1976) Simple Mathematical Models with Very Complicated Dynamics. Nature, 261, 459-467.
http://dx.doi.org/10.1038/261459a0
[104] Wikipedia. Logistic Map. Cited 20 February 2009.
http://en.wikipedia.org/w/index.php?title=chaotic_maps&oldid=261864353
[105] Naess, A. (2000) Chaos and Nonlinear Stochastic Dynamics. Probabilistic Engineering Mechanics, 15, 37-47.
http://dx.doi.org/10.1016/S0266-8920(99)00007-7
[106] Contributors, W. (2005) Chaos Theory.
http://en.wikipedia.org/w/index.php?title=Chaos_theory&oldid=264934743
[107] Rossler, O. (1976) An Equation for Continous Chaos. Physics Letters A, 57, 397-398.
http://dx.doi.org/10.1016/0375-9601(76)90101-8
[108] Ho, A. (2006) Chaos Introduction.
http://www.zeuscat.com/andrew/chaos/chaos.html
[109] Wikipedia. Tent Map. Cited 25 February 2009.
http://en.wikipedia.org/w/index.php?title=Tent_map&oldid=186656075
[110] Li, S., Chen, G. and Mou, X. (2005) On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps. International Journal of Bifurcation and Chaos, 15, 3119-3151. http://dx.doi.org/10.1142/S0218127405014052
[111] Jun, P., Jin, S.Z., Liu, Y.G., Yang, Z.M., You, M.Y. and Pei, Y.J. (2008) A Novel Scheme for Image Encryption Based on Piecewise Linear Chaotic Map. 2008 IEEE Conference on Cybernetics and Intelligent Systems, Chengdu, 21-24 September 2008, 1012-1016.
[112] Rhouma, R., Arroyo, D. and Belghith, S. (2009) A New Color Image Cryptosystem Based on a Piecewise Linear Chaotic Map. 6th International Multi-Conference on Systems, Signals and Devices, 2009, SSD ’09, 23-26 March 2009, 1-6.
http://dx.doi.org/10.1109/SSD.2009.4956666
[113] Yang, H.Q., Wong, K.-W., Liao, X.F., Zhang, W. and Wei, P.C. (2010) A Fast Image Encryption and Authentication Scheme Based on Chaotic Maps. Communications in Nonlinear Science and Numerical Simulation, 15, 3507-3517.
http://dx.doi.org/10.1016/j.cnsns.2010.01.004
[114] Yang, H.Q., Wong, K.-W., Liao, X.F., Wang, Y. and Yang, D.G. (2009) One-Way Hash Function Construction Based on Chaotic Map Network. Chaos, Solitons & Fractals, 41, 2566-2574.
http://dx.doi.org/10.1016/j.chaos.2008.09.056
[115] Lian, S., Sun, J. and Wang, Z. (2005) A Block Cipher Based on a Suitable Use of the Chaotic Standard Map. Chaos, Solitons & Fractals, 26, 117-129.
http://dx.doi.org/10.1016/j.chaos.2004.11.096
[116] Li, P., Li, Z., Halang, W.A. and Chen, G.R. (2007) A Stream Cipher Based on a Spatiotemporal Chaotic System. Chaos, Solitons & Fractals, 32, 1867-1876.
http://dx.doi.org/10.1016/j.chaos.2005.12.021
[117] Ali-Pacha, A., Hadj-Said, N., M’Hamed, A. and Belgoraf, A. (2007) Lorenz’s Attractor Applied to the Stream Cipher (Ali-Pacha Generator). Chaos, Solitons & Fractals, 33, 1762-1766.
http://dx.doi.org/10.1016/j.chaos.2006.03.009
[118] Tong, X. and Cui, M. (2008) Image Encryption with Compound Chaotic Sequence Cipher Shifting Dynamically. Image and Vision Computing, 26, 843-850.
http://dx.doi.org/10.1016/j.imavis.2007.09.005
[119] Gao, H., Zhang, Y.S., Liang, S.Y. and Li, D.Q. (2006) A New Chaotic Algorithm for Image Encryption. Chaos, Solitons & Fractals, 29, 393-399.
http://dx.doi.org/10.1016/j.chaos.2005.08.110
[120] Chee, C.Y. and Xu, D. (2006) Chaotic Encryption Using Discrete-Time Synchronous Chaos. Physics Letters A, 348, 284-292.
http://dx.doi.org/10.1016/j.physleta.2005.08.082
[121] Gao, T. and Chen, Z. (2008) A New Image Encryption Algorithm Based on Hyper-Chaos. Physics Letters A, 372, 394-400.
http://dx.doi.org/10.1016/j.physleta.2007.07.040
[122] Sun, F. and Liu, S. (2009) Cryptographic Pseudo-Random Sequence from the Spatial Chaotic Map. Chaos, Solitons & Fractals, 41, 2216-2219.
http://dx.doi.org/10.1016/j.chaos.2008.08.032
[123] Li, P., Li, Z., Halang, W.A. and Chen, G.R. (2006) A Multiple Pseudorandom-Bit Generator Based on a Spatiotemporal Chaotic Map. Physics Letters A, 349, 467-473.
http://dx.doi.org/10.1016/j.physleta.2005.09.060
[124] Arroyo, D., Li, C.Q., Li, S.J. and Alvarez, G. (2009) Cryptanalysis of a Computer Cryptography Scheme Based on a Filter Bank. Chaos, Solitons & Fractals, 41, 410-413.
http://dx.doi.org/10.1016/j.chaos.2008.01.020
[125] Kanso, A. and Smaoui, N. (2009) Logistic Chaotic Maps for Binary Numbers Generations. Chaos, Solitons & Fractals, 40, 2557-2568.
http://dx.doi.org/10.1016/j.chaos.2007.10.049