[1] G. Álvarez, F. Montoya and M. Romera et al., Cryptanalysis of an
ergodic chaotic cipher, Physics Letters A 311(2-3) (2003), 172-179.
[2] M. S. Baptista, Cryptography with chaos, Physics Letter A 240(1)
(1998), 50-54.
[3] F. J. Huang and Z. H. Guan, A modified method of a class of
recently presented cryptosystems, Chaos, Solitons and Fractals 23(5)
(2005), 1893-1899.
[4] S. J. Li, X. Q. Mou and Y. L. Cai et al., On the security of a
chaotic encryption scheme: Problems with computerized chaos in finite
computing precision, Computer Physics Communications 153(1) (2003),
52-58.
[5] N. K. Pareek, V. Patidar and K. K. Sud, Cryptography using
multiple one-dimensional chaotic maps, Commun. Nonlinear Sci. Numer.
Simul. 10(7) (2005), 715-723.
[6] X. Y. Wang, Chaos in the Complex Nonlinearity System, pp. 1-68,
Electronics Industry Press, Beijing, 2003.
[7] X. Y. Wang and X. J. Wang, Design of chaotic pseudo-random bit
generator and its applications in stream-cipher cryptography,
International Journal of Modern Physics C 19(5) (2008), 813-820.
[8] X. Y. Wang and Q. Yu, A block encryption algorithm based on
dynamic sequences of multiple chaotic systems, Commun. Nonlinear Sci.
Numer. Simul. 14(2) (2009), 574-581.
[9] X. Y. Wang and C. H. Yu, Cryptanalysis and improvement on a
cryptosystem based on a chaotic map, Comput. Math. Appl. 57(3) (2009),
476-482.
[10] J. Wei, X. F. Liao and K. W. Wong et al., Cryptanalysis of a
cryptosystem using multiple one-dimensional chaotic maps, Commun.
Nonlinear Sci. Numer. Simul. 12(5) (2007), 814-822.
[11] W. K. Wong, L. P. Lee and K. W. Wong, A modified chaotic
cryptographic method, Computer Physics Communications 138(3) (2001),
234-236.
[12] K. W. Wong, A combined chaotic cryptographic and hashing scheme,
Physics Letters A 307(5-6) (2003), 292-298.