3Dacier M, Jackson K. Intrusiondetection[J]. Computer Networks, 1999;31(23- 24):2433-2434.
4朱文余,孙琦.计算机密码应用基础[M].北京:科学出版社.2006:191-201.
5[加]Stinson D R.密码学原理与实践[M].冯登国,译.北京:电子工业出版社,2003:123-126.
6[7]LI S,CHEN G,MOU X.On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps[J].International Journal of Bifurcation and Chaos,2005,15(10):3 119-3 151.
8[9]MURPHY S,ROBSHAW M J B.Key-Dependent S-Boxes and Differential Cryptanalysis[J].Designs,Codes and Cryptography,2002,27:229 -255.
9[10]BIHAM E.Cryptsnalysis of the Chaotic Map Cryptosystem Suggested.at EUROCRYPT91[C]//Advances in Cryptology-Eurocrypt' 91,Berlin:Spring-Verlag,1991:532-534.
10[11]BETH T,LAZIC D E,MATHIAS A.Cryptanalysis of Cryptosystems Based on Remote Chaos Replication[C]//Advances in Cryptology-Eurocrypt'94,Berlin:SpringVerlag,1994:318-331.