[1] 陈诚,曹秀英,帅富强.数字跳频通信设备关键技术的研究与发现[J].南京师范大学学报:工程技术版,2007,7(4):80-83.
[2]樊雷.IP语音混沌加密算法研究[D].南京:南京理工大学自动化学院,2004.
[3]侯爽.语音加密算法及其在网络通信系统中的应用研究[D].南京:南京理工大学自动化学院,2007.
[4]Goldburg B,Sridharan S,Dawson E.On the use of a frequency domain vector codebook for the cryptanalysis of analog speech scramblers[J].IEEE International Symposium on Circuits and Systems,1991,1:328-331.
[5]Cox R V,Bock D E,Bauer K B,et al.The analog voice privacy system[J].AT&T Technical Journal,1987,66(1):119-131.
[6]田丽平.基于混沌复合映射的语音信号流安全通信仿真实现[J].计算机与现代化,2007(2):97-98.
[7]魏建香,罗军舟.基于哥德尔β函数的数据加密[J].南京师范大学学报:工程技术版,2002,2(1):14-17.
[8]刘爱华,陈钧,解芳.数据库敏感数据加密算法的研究与改进[J].南京师范大学学报:工程技术版,2012,12(3):68-70.
[9]Kocarev L,Jakimoski G,Stojanovski T,et al.From chaotic maps to encryption schemes[J].IEEE International Symposium on Circuits and Systems,1998,4:514-517.
[10]关新平,范正平,陈彩莲,等.混沌控制及其在保密通信中的应用[M].北京:国防工业出版社,2002.
[11]Cuomo K M,Oppenheim A V,Strogatz S H.Synchronization of Lorenz-based chaotic circuits with applications to communications[J].IEEE Transactions on Circuits and Systems II:Analog and Digital Signal Processing,1993,40:626-633.
[12]Shannon C E.Communication theory of secrecy system[J].Bell System Technical,1949,28(4):656-715.
[13]樊雷,茅耀武,孙金生.一种结合猫映射与Logistic映射的语音加密算法[J].控制与决策,2004,19(10):1 167-1 174.
[14]Dachselt F,Kelber K,Schwarz W,et al.Chaotic versus classical strean ciphers-a comparative study[C]//Proceedings of the 1998 IEEE International Symposium on Circuits and Systems.New York:IEEE,1998,4:518-521.
[15]Froyland J.Introduction to Chaos and Coherence[M].London:Institute of Physics Publishing Ltd.,1992.
[16]Jakimoski G,Kocarev L.Chaos and cryptography:block encryption ciphers based on chaotic maps[J].IEEE Transactions on Circuits and Systems I:Fundamental Theory and Applications,2001,48(2):163-169.
[17]Texas Instruments.TMS320C55x DSP Mnemonic Instruction Set Reference Guide[M].Texas:Texas Instruments,2000.
[18]孟勃,朱明.基于McBSP实现DSP与串行Flash之间的接口通讯[J].电子器件,2006,29(3):921-924.
[19]顾学乔,李杰,徐寅林.DSP与PC机的高速数据传输接口设计与实现[J].南京师范大学学报:工程技术版,2009,9(3):73-76.