Li
J., Gan
L., “Study on chaotic cryptosystem for digital image encryption,” in Third Int. Conf. Measuring Technology and Mechatronics Automation , pp. 426 –430, IEEE , Shangshai, China (2011).
Xuemei
L., Tong
X., Dai
L., “A novel scheme reality preserving image encryption,” in Third Int. Conf. Measuring Technology and Mechatronics Automation , pp. 218 –221, IEEE , Shangshai, China (2011).
Fu
C. et al., “A chaos-based digital image encryption scheme with an improved diffusion strategy,” Opt. Express. 20, (3 ), 2363 –2378 (2012). 1094-4087
CrossRef Zhu
H., Zhao
C., Zhang
X., “A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem,” Signal Process. Image Commun.. 28, , 670 –680 (2013). 0923-5965
CrossRef FIPS PUB 197, Federal Information Processing Standards Publications. , NIST (2001).
Stinson
D. R., Cryptography: Theory and Practice. , Chapman & Hall/ CRC Press , New York (2005).
Biham
E., Shamir
A., “Differential cryptanalysis of the full 16-round DES,” Lect. Notes Comput. Sci.. 740, , 494 –502 (1993). 0302-9743
CrossRef Matsui
M., “Linear cryptanalysis for DES cipher,” Lect. Notes Comput. Sci.. 765, , 386 –397 (1994). 0302-9743
CrossRef Daemen
J., Rijmen
V., “AES proposal: Rijndael, AES algorithm submission,” in FIPS 197 , NIST (1999).
Carlet
C., “On highly nonlinear S-boxes and their inability to thwart DPA attacks,” in 6th Int. Conf. on Cryptology of the Springer-Verlag , pp. 49 –62, Springer-Verlag (2005).
FIPS PUB 46-3, Federal Information Processing Standards Publication. , NIST (1999).
Keshari
S., Gopal-Modani
S., “Color image encryption scheme based on 4-weighted fractional Fourier transform,” J. Electron. Imaging. 21, , 033018 (2012). 1017-9909
CrossRef Zhengjun
L. et al., “Image encryption by using gyrator transform and Arnold transform,” J. Electron. Imaging. 20, , 013020 (2011). 1017-9909
CrossRef Wen
C., Xudong
C., Sheppard
C. J. R., “Optical color-image encryption and synthesis using coherent diffractive imaging in the Fresnel domain,” Opt. Express. 20, (4 ), 3853 –3865 (2012). 1094-4087
CrossRef Refregier
P., Javidi
B., “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett.. 20, , 767 –769 (1995). 0146-9592
CrossRef Wen
C., Xudong
C., “Double random phase encoding using phase reservation and compression,” J. Opt.. 16, , 025402 –025409 (2014). 0150-536X
CrossRef Wen
C., Xudong
C., “Ghost imaging for three-dimensional optical security,” Appl. Phys. Lett.. 103, , 221106 (2013). 0003-6951
CrossRef Wen
C., Bahram
J., Xudong
C., “Advances in optical security systems,” Adv. Opt. Photonics. 6, , 120 –155 (2014). 1943-8206
CrossRef Yue
W. et al., “Image encryption using the two-dimensional logistic chaotic map,” J. Electron. Imaging. 21, , 013014 (2012). 1017-9909
CrossRef Osvik
D. A., Shamir
A., Tromer
E., “Cache attacks and countermeasures: the case of AES,” Ext. Version. 3860, , 11 –20 (2005).
CrossRef Rukhin
A. et al., “A statistical test suite for random and pseudorandom number generators for cryptographic applications,” in NIST 800-22 , NIST (2010).
Wolpe
R., Myers
R., Probability and Statistics for Engineers and Scientists. , Prentice Hall , México (2007).
Nom-151, Norma Oficial Mexicana NOM-151-SCFI-2002, Prácticas comerciales—Requisitos que deben observarse para la conservación de mensajes de datos. , SCFI (2002).
T. M.
, Apostol, Análisis Matemático. , Editorial Revert , Barcelona (1994).
Michael
S., Calculus: Cálculo Infinitesimal. , Reverte , Barcelona Espanã (1993).
FIPS PUB, Federal Information Processing Standards Publication 180-3. , NIST (2008).
Shannon
E., “A mathematical theory of communication,” Bell Syst. Tech. J.. 27, , 377 –423, 623 –656 (1948). 0005-8580
CrossRef Abramowitz
M., Stegun
I., Handbook of Mathematical Functions, Applied Mathematics Series. , Vol. 55, National Bureau of Standards , New York (1964).
Gallian
J., Contemporary Abstract Algebra. , 7th ed., Brooks/Cole , California (2011).
Gómez
A., Enciclopedia de la Seguridad Informática. , Alfaomega , México (2007).
ElGamal
T., “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. Inf. Theory. 31, , 469 –472 (1985). 0018-9448
CrossRef Rivest
R. L., Shamir
A., Adleman
L., “A method for obtaining digital signatures and public key cryptosystems,” Commun. ACM. 21, , 120 –126 (1978). 0001-0782
CrossRef Flores-Carapia
R., Silva-García
V. M., Rentería-Márquez
C., “Monte Carlo scheme: cryptography application,” Appl. Math. Sci.. 6, (136), 6761 –6768 (2012). 1312-885X
Grinstead
C., Snell
L., Introduction to Probability. , American Mathematical Society (1997).
Devore
J., Probabilidad y Estadística: para ingeniería y ciencias. , 6th ed., International Thompson , México (2005).
Azarderakhsh
R., Reyhani-Masoleh
A., “Parallel and high-speed computations of elliptic curve crytography using hybrid-double multipliers,” IEEE Trans. Parallel Distrib. Syst.. PP, (99 ), 1 –11 (2014). 1045-9219
CrossRef Jost
H., El detalle en la tipografía. , Comgrafic , Barcelona (2008).
Baruah
S. et al., “Scheduling real-time mixed-criticality jobs,” IEEE Trans. Comput.. 61, (8 ), 1140 –1152 (2012). 0018-9340
CrossRef