[1]
Kalouptsidis N, Signal processing systems, in Telecommunications and Signal Processing Series. New York: Wiley, (1996).
Google Scholar
[2]
Golomb S. W, Shift Register Sequences. San Francisco, CA: Holden-Day, (1967).
Google Scholar
[3]
Menezes A. J, Van Oorschot P. C, and Vanstone S. A, Handbook of Applied Cryptography. Boca Raton, FL: CRC, (1996).
Google Scholar
[4]
Ulam S. L. and Neumann J., On combination of stochastic and deterministic processes, Bull. Math. Soc., vol. 53, (1947).
Google Scholar
[5]
Kocarev L, and Jakimoski G, Logistic map as a block encryption algorithm. Phys. Lett. A, Vol. 289 (2001), p.199.
DOI: 10.1016/s0375-9601(01)00609-0
Google Scholar
[6]
Short, K. M., Steps toward unmasking secure communications, Int.J. Bifurcation and Chaos, Vol. 4(1994), pp.959-977.
DOI: 10.1142/s021812749400068x
Google Scholar
[7]
Kanso A, and Smaoui N, Logistic chaotic maps for binary numbers generations, Chaos, Solitons & Fractals, Vol. 40(2009), p.2557.
DOI: 10.1016/j.chaos.2007.10.049
Google Scholar
[8]
M. Jing, T. Chao and D. G. Huan. Synchronization of the time-varying parameter chaotic system and its application to secure communication, Chin. Phys. Soc, (2003).
DOI: 10.1088/1009-1963/12/4/307
Google Scholar
[9]
Prokhorov M. D, Ponomarenko V. I, Karavaev A. S, and Bezruchko B. P, Reconstruction of time-delayed feedback systems form time series, Physica D, Vol. 203 (2005), p.209.
DOI: 10.1016/j.physd.2005.03.013
Google Scholar