<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="style/detail_T.xsl"?>
<bibitem type="A">   <ARLID>0377749</ARLID> <utime>20240111140817.7</utime><mtime>20120717235959.9</mtime>         <title language="eng" primary="1">Security Analysis of Anti-Synchronization Chaos Shift Keying method Via Power and Return Map Analysis</title>  <specification> <page_count>2 s.</page_count> <media_type>DVD Rom</media_type> </specification>   <serial><ARLID>cav_un_epca*0377748</ARLID><title>Poceedings of the third  International Conference on Dynamics, Vibration and Control (ICDVC-2010)</title><part_num/><part_title/><page_num>1-2</page_num><publisher><place>Hangzhou</place><name>Zhejiang University</name><year>2010</year></publisher></serial>    <keyword>Nonlinear system</keyword>   <keyword>shift keying</keyword>   <keyword>generalized Lorenz system</keyword>   <keyword>synchronization</keyword>   <keyword>anti-synchronization</keyword>   <keyword>secure communication</keyword>   <keyword>return map</keyword>   <keyword>power analysis</keyword>    <author primary="1"> <ARLID>cav_un_auth*0101074</ARLID> <name1>Čelikovský</name1> <name2>Sergej</name2> <full_dept language="cz">Teorie řízení</full_dept> <full_dept language="eng">Department of Control Theory </full_dept> <department language="cz">TŘ</department> <department language="eng">TR</department> <institution>UTIA-B</institution> <full_dept>Department of Control Theory</full_dept>  <fullinstit>Ústav teorie informace a automatizace AV ČR, v. v. i.</fullinstit> </author> <author primary="0"> <ARLID>cav_un_auth*0215855</ARLID> <name1>Lynnyk</name1> <name2>Volodymyr</name2> <full_dept language="cz">Teorie řízení</full_dept> <full_dept>Department of Control Theory </full_dept> <department language="cz">TŘ</department> <department>TR</department> <institution>UTIA-B</institution> <full_dept>Department of Control Theory</full_dept>  <fullinstit>Ústav teorie informace a automatizace AV ČR, v. v. i.</fullinstit> </author>   <source> <source_type>textový dokument</source_type> <source_size>118 kB</source_size> </source>        <cas_special> <research> <research_id>CEZ:AV0Z10750506</research_id> </research>  <abstract language="eng" primary="1">During the last two decades, many chaotic communication schemes based on chaotic dynamics has been  proposed. The well-known features of the chaotic systems like strong dependence on the initial data, topological  transitivity, wide spread spectrum of its signal, etc., directly suggest the idea to use suitable chaos generators to build  a new generation of secure encryption methods. Unfortunately, the use of the continuous time chaotic systems for  encryption of digital data and both its practical aspects and security analysis have been studied much less  due to prevalently used chaotic masking.</abstract>  <action target="WRD"> <ARLID>cav_un_auth*0281909</ARLID> <name>The Third International Conference on Dynamics, Vibration and Control (ICDVC-2010)</name> <place>Hangzhou</place> <dates>12.05.2010-14.05.2010</dates>  <country>CN</country> </action>   <reportyear>2013</reportyear>  <RIV>BC</RIV>      <num_of_auth>2</num_of_auth>   <permalink>http://hdl.handle.net/11104/0209830</permalink>       <arlyear>2010</arlyear>       <unknown tag="mrcbU56"> textový dokument 118 kB </unknown> <unknown tag="mrcbU63"> cav_un_epca*0377748 Poceedings of the third  International Conference on Dynamics, Vibration and Control (ICDVC-2010) 1 2 Hangzhou Zhejiang University 2010 </unknown> </cas_special> </bibitem>