[1] G. Álvarez and S. Li , Breaking network security based on synchronized chaos, Computer
Communications, Elsevier , 27 (2004), 1679-1681.
[2] G. Álvarez, S. Li, F. Montoya, M. Romera and G. Pastor, Breaking projective chaos
synchronization secure communication using filtering and generalized synchronization,
Chaos, Solitons & Fractuals, Elsevier, 24 (2005), 775-783.
[3] G. Álvarez, F. Montoya, M. Romera and G. Pastor, Breaking two secure communication
systems based on chaotic masking, IEEE Transactions on Circuits and Systems-II,
51 (2004), 505-506.
[4] T.-S. Chiang and P. Liu, Fuzzy model-based discrete-time Chiang type chaotic cryptosystem,
IEEE Int. Fuzzy Systems Conference, 2001.
[5] G. Grassi and S. Mascolo, Observer design for cryptography based on hyperchaotic
oscillators, Electronics Letters, 34 (1998), 1844 -1846.
[6] K. Halle, C. W. Wu, M. Itoh and L. O. Chua, Spread spectrum communication through
modulation of chaos, Int. Journal of Bifurcations and Chaos, 3 (1992), 469-477.
[7] K.-Y. Lian, C.-S. Chiu, T.-S. Chiang, and P. Liu, Secure communications of chaotic systems
with robust performance via fuzzy observer-based design, IEEE Transactions on Fuzzy
Systems, 9 (2001), 212-220.
[8] K.-Y. Lian, P. Liu and C.-S. Chiu, Fuzzy model-based approach to chaotic encryption
using synchronization, Int. Journal of Bifurcation and Chaos, 13 (2003), 215-225.
[9] K.-M. Ma, Observer design for a class of fuzzy systems, Proceedings of First International
Conference on Machine Learning and Cybernetics, Beijing, (2002), 46-49.
[10] K. M. Short, Steps towards unmasking secure communication, Int. Journal of Bifurcation
and Chaos, 4 (1994), 959-977.
[11] K. M. Short, Unmasking a modulated chaotic communications scheme, Int. Journal of
Bifurcation and Chaos, 6 (1996), 367-375.
[12] A. Tamasevicius, G. Mykolaitis, A. Cenys and A. Namajunas, Synchronisation of 4D
hyperchaotic oscillators, Electronics Letters, 32 (1996), 1536-1538.
[13] A. Tamasevicius, A. Namajunas and A. Cenys, Simple 4D chaotic oscillator, Electronics
Letters, 32 (1996), 957-958.
[14] T. Yang, C. Wah Wu and L. O. Chua, Cryptography based on chaotic systems, IEEE
Transactions on Circuits and Systems-I, 44 (1997), 469-472.