<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462007000300004</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A Simple Deterministic Lorenz Chaotic-Based Methodology to Cipher and Decipher Information]]></article-title>
<article-title xml:lang="es"><![CDATA[Metodología Basada en el Modelo Discreto del Sistema de Lorenz Para Cifrar y Descifrar Información]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Suárez Castañón]]></surname>
<given-names><![CDATA[Miguel S.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Aguilar Ibañez]]></surname>
<given-names><![CDATA[Carlos]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Martínez García]]></surname>
<given-names><![CDATA[Juan C.]]></given-names>
</name>
<xref ref-type="aff" rid="A03"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Instituto Politécnico Nacional Escuela Superior de Cómputo ]]></institution>
<addr-line><![CDATA[México, D.F. ]]></addr-line>
<country>México</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Instituto Politécnico Nacional Centro de Investigación en Computación ]]></institution>
<addr-line><![CDATA[México, D.F. ]]></addr-line>
<country>México</country>
</aff>
<aff id="A03">
<institution><![CDATA[,Instituto Politécnico Nacional CINVESTAV Departamento de Control Automático]]></institution>
<addr-line><![CDATA[México, D.F. ]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2007</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2007</year>
</pub-date>
<volume>11</volume>
<numero>1</numero>
<fpage>26</fpage>
<lpage>38</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462007000300004&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462007000300004&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462007000300004&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[We present a secure deterministic cipher and decipher mechanism based on the well-known Lorenz dynamic system. The ciphering process is performed by the combination of the message to be ciphered and the states of the Lorenz dynamic system, which act as the ciphering key. The deciphering process is implemented by the reconstruction of the key, which is generated using a Lorenz system state observer. The observed key is then used in the decipher process in order to recover the ciphered message.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[En este artículo presentamos un mecanismo seguro de cifrado y descifrado determinístico basado en el muy conocido sistema dinámico de Lorenz. El proceso de cifrado se lleva a cabo mediante la combinación del mensaje a ser cifrado y los estados del sistema de Lorenz, el cual actúa como llave de cifrado. El proceso de descifrado se realiza mediante la reconstrucción de la llave, que es generada usando un observador de estado del sistema de Lorenz. La llave observada es usada en el proceso de descifrado con el objeto de recuperar el mensaje cifrado]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Cipher/Decipher]]></kwd>
<kwd lng="en"><![CDATA[Chaotic System]]></kwd>
<kwd lng="en"><![CDATA[State Observer]]></kwd>
<kwd lng="en"><![CDATA[Discrete Lorenz System]]></kwd>
<kwd lng="es"><![CDATA[Cifrador/Decifrador]]></kwd>
<kwd lng="es"><![CDATA[Sistema Caótico]]></kwd>
<kwd lng="es"><![CDATA[Observador de Estado]]></kwd>
<kwd lng="es"><![CDATA[Sistema de Lorenz]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="justify"><font face="verdana" size="4">Art&iacute;culos</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="4"><b>A Simple Deterministic Lorenz Chaotic&#150;Based Methodology to Cipher and Decipher Information*</b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="3"><b><i>Metodolog&iacute;a Basada en el Modelo Discreto del Sistema de Lorenz Para Cifrar y Descifrar Informaci&oacute;n</i></b></b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>Miguel S. Su&aacute;rez Casta&ntilde;&oacute;n<sup>1</sup>, Carlos Aguilar Iba&ntilde;ez<sup>2</sup> and Juan C. Mart&iacute;nez Garc&iacute;a<sup>3</sup></b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><i><sup>1</sup> Escuela Superior de C&oacute;mputo del I.P.N. Av. Juan de Dios B&aacute;tiz S/N esq. Manuel Oth&oacute;n de Mendizabal 07738 M&eacute;xico, D.F., M&eacute;xico Tel. +(52)&#150;55&#150;57296000, ext. 52028,</i>     <br> e&#150;mail:<a href="mailto:sasuarez@prodigy.net.mx"> sasuarez@prodigy.net.mx</a></font></p>     ]]></body>
<body><![CDATA[<p align="center"><font face="verdana" size="2"> <i><sup>2</sup> Centro de Investigaci&oacute;n en Computaci&oacute;n del I.P.N. Av. Juan de Dios B&aacute;tiz S/N esq. Manuel Oth&oacute;n de Mendizabal     <br> 07738 M&eacute;xico, D.F., M&eacute;xico Tel. +(52)&#150;55&#150;57296000, ext. 56568,</i>     <br> e&#150;mail: <a href="mailto:caguilar@pollux.cic.ipn.mx"> caguilar@pollux.cic.ipn.mx</a></font></p>     <p align="center"><font face="verdana" size="2"><i><sup>3</sup> Departamento de Control Autom&aacute;tico CINVESTAV&#150;IPN 07300 M&eacute;xico, D.F., M&eacute;xico</i>     <br> e&#150;mail: <a href="mailto:martinez@ctrl.cinvestav.mx"> martinez@ctrl.cinvestav.mx</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><u>Article received on June 24, 2006; accepted on October 01, 2007</u></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><sup>*</sup> A first version of this work was presented at the 3&ordm; Congreso Internacional en Control, Instrumentaci&oacute;n Virtual y Sistemas Digitales, August, 2001, pp.20-29. </font></p>       <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>     <p align="justify"><font face="verdana" size="2">We present a secure deterministic cipher and decipher mechanism based on the well&#150;known Lorenz dynamic system. The ciphering process is performed by the combination of the message to be ciphered and the states of the Lorenz dynamic system, which act as the ciphering key. The deciphering process is implemented by the reconstruction of the key, which is generated using a Lorenz system state observer. The observed key is then used in the decipher process in order to recover the ciphered message. </font></p>     <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> Cipher/Decipher, Chaotic System, State Observer, Discrete Lorenz System</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>     <p align="justify"><font face="verdana" size="2">En este art&iacute;culo presentamos un mecanismo seguro de cifrado y descifrado determin&iacute;stico basado en el muy conocido sistema din&aacute;mico de Lorenz. El proceso de cifrado se lleva a cabo mediante la combinaci&oacute;n del mensaje a ser cifrado y los estados del sistema de Lorenz, el cual act&uacute;a como llave de cifrado. El proceso de descifrado se realiza mediante la reconstrucci&oacute;n de la llave, que es generada usando un observador de estado del sistema de Lorenz. La llave observada es usada en el proceso de descifrado con el objeto de recuperar el mensaje cifrado </font></p>     <p align="justify"><font face="verdana" size="2"><b>Palabras Clave: </b>Cifrador/Decifrador, Sistema Ca&oacute;tico, Observador de Estado, Sistema de Lorenz</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><a href="/pdf/cys/v11n1/v11n1a4.pdf">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>References</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">1. <b>Acheson D., </b>"From Calculus to Chaos: An introduction to dynamics", Oxford University Press, 280 pages, 1997.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043180&pid=S1405-5546200700030000400001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">2. <b>Alligood K. T., Sauer T. </b>and <b>Yorke J.A., </b>"Chaos: An Introduction to Dynamical System", Springer, 603 pages, 1997.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043181&pid=S1405-5546200700030000400002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">3. <b>Tsonis, A. A., </b>"Chaos. From Theory to Applications", Plenun Press, New York, 1992.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043182&pid=S1405-5546200700030000400003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">4. <b>Carroll T. L. </b>and <b>P&eacute;cora L., </b>"Synchronizing chaotic circuits", IEEE Transactions on Circuits and Systems, vol. 38, (4) (1991), pp. 453&#150;456.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043183&pid=S1405-5546200700030000400004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">5. <b>Conrad M., </b>"Algorithmic specification as a technique for computing with informal biological models", Biosystems vol. 13 (1981), pp. 303&#150;320.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043184&pid=S1405-5546200700030000400005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">6. <b>Conrad M., </b>"Adaptability",. Plenun Press, New York, 1983.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043185&pid=S1405-5546200700030000400006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">7. <b>Cuomo. K. M., Oppenheim A. V. </b>and <b>Strogatz </b><b>S.</b> <b>H., </b>"Synchronization of Lorenz&#150;Based Chaotic Circuits with Applications to Communications", IEEE Transactions on Circuits and Systems&#150;II: Analog and Digital Signal Processing, vol. 40(10), October 1993, pp. 626&#150;633.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043186&pid=S1405-5546200700030000400007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">8. <b>DeMillo R. A., Lynch N. A. </b>and <b>Merritt M. J., </b>"Applied Cryptology, cryptographic protocols, and computer security models", American Mathematical Society, Proceedings of Symposia in Applied Mathematics, vol. 29, 1983.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043187&pid=S1405-5546200700030000400008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">9. <b>Devaney R. L., </b>"An Introduction to Chaotic Dynamical System", Addison&#150;Wesley, 1989.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043188&pid=S1405-5546200700030000400009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">10. <b>Devaney R. L, </b>"Chaos, Fractals, and Dynamics: Computer Experiments in Mathematics", Addison&#150;Wesley, 1990.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043189&pid=S1405-5546200700030000400010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">11. <b>Fradkov A. L. </b>and <b>Markov A. Yu., </b>"Adaptive Synchronization of Chaotic Systems Based on Speed Gradient Method  and Passification",  IEEE  Transactions  on Circuits  and  Systems&#150;I:     Fundamental  Theory  and Applications, vol. 44(10), 1997, pp. 905&#150;912.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043190&pid=S1405-5546200700030000400011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">12. <b>Gerald C. F. </b>and <b>Wheatley P. O., </b>"Applied Numerical Analysis", Addison&#150;Wesley, Fifth edition, 1994.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043191&pid=S1405-5546200700030000400012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">13. <b>Holden A. V. </b>and <b>Muhamad M. A., </b>"Chaotic activity in neuronal systems",    Cybernetics and Systems Research 2, Ed. R. Trappl, Elsevier, Amsterdam, 1984, pp. 245&#150;50.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043192&pid=S1405-5546200700030000400013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">14. <b>Holden A., </b>"Chaos", Princeton University Press, 1986.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043193&pid=S1405-5546200700030000400014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">15. <b>Huijberts H. J. C, Nijmeijer H. </b>and <b>Willems R. M. A., </b>"A control perspective on communications using chaotic systems", Proceedings 37th IEEE Conference on Decision and Control, Tampa, Florida December 16&#150;18, 1998, pp. 1957&#150;1962, vol. 2.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043194&pid=S1405-5546200700030000400015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">16. <b>Khalil H. K. </b>"Non&#150;linear Systems", Prentice Hall, 3rd. edition, 2002.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043195&pid=S1405-5546200700030000400016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">17. <b>Nijmeijer H., </b>and <b>Mare&eacute;is M. Y., </b>"An Observer Looks at Synchronization", IEEE Transactions on Circuits and Systems&#150;I: Fundamental Theory and Applications, vol. 44(10), 1997, pp. 882&#150;890.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043196&pid=S1405-5546200700030000400017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">18. <b>Ogorzalek M.J., </b>"Taming Chaos Part I: Synchronization", IEEE T.C.S. Vol. 40, 1993, pp. 693&#150;699.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043197&pid=S1405-5546200700030000400018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">19. <b>Pecora L. M. </b>and <b>Carroll T. L., </b>"Driving systems with chaotic signals", Physical Review A. vol. 44, no.4, 1991, pp. 2374&#150;2383.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043198&pid=S1405-5546200700030000400019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">20. <b>Pfleeger C, </b>"Security in computing", Prentice&#150;Hall, 1996.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043199&pid=S1405-5546200700030000400020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">21. <b>Schneier B., </b>"Applied Cryptography", John Wiley &amp; Sons, 1996.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043200&pid=S1405-5546200700030000400021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">22. <b>Sira&#150;Ram&iacute;rez H. </b>And <b>Cruz&#150;Hern&aacute;ndez C, </b>"Synchronization of Chaotic System:   A Hamiltonian System Approach", International Journal of Bifurcations and Chaos, vol. 11(5), 2001, pp. 1381&#150;1395.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043201&pid=S1405-5546200700030000400022&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">23. <b>Special Issue, </b>Systems and Control Letters, Vol. 31, 1997.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043202&pid=S1405-5546200700030000400023&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">24. <b>Special Issue, </b>Chaos Synchronization and Control: Theory and Applications, IEEE Transactions on Circuits and Systems&#150;I: Fundamental Theory and Applications, vol. 40, (1993).</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043203&pid=S1405-5546200700030000400024&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">25. <b>Special Issue, </b>"Chaos Synchronization and Control: Theory and Applications", IEEE Transactions on Circuits and Systems&#150;I; Fundamental Theory and Applications, vol. 44, (1997).</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2043204&pid=S1405-5546200700030000400025&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> ]]></body><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Acheson]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[From Calculus to Chaos: An introduction to dynamics]]></source>
<year>1997</year>
<page-range>280</page-range><publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alligood]]></surname>
<given-names><![CDATA[K. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Sauer]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Yorke]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Chaos: An Introduction to Dynamical System]]></source>
<year>1997</year>
<page-range>603</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tsonis]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Chaos: From Theory to Applications]]></source>
<year>1992</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Plenun Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carroll]]></surname>
<given-names><![CDATA[T. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Pécora]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Synchronizing chaotic circuits]]></article-title>
<source><![CDATA[IEEE Transactions on Circuits and Systems]]></source>
<year>1991</year>
<volume>38</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>453-456</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Conrad]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Algorithmic specification as a technique for computing with informal biological models]]></article-title>
<source><![CDATA[Biosystems]]></source>
<year>1981</year>
<volume>13</volume>
<page-range>303-320</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Conrad]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Adaptability]]></source>
<year>1983</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Plenun Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cuomo]]></surname>
<given-names><![CDATA[K. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Oppenheim]]></surname>
<given-names><![CDATA[A. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Strogatz]]></surname>
<given-names><![CDATA[S. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Synchronization of Lorenz-Based Chaotic Circuits with Applications to Communications]]></article-title>
<source><![CDATA[IEEE Transactions on Circuits and Systems-II]]></source>
<year>Octo</year>
<month>be</month>
<day>r </day>
<volume>40</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>626-633</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[DeMillo]]></surname>
<given-names><![CDATA[R. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Lynch]]></surname>
<given-names><![CDATA[N. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Merritt]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Applied Cryptology, cryptographic protocols, and computer security models]]></article-title>
<source><![CDATA[Proceedings of Symposia in Applied Mathematics]]></source>
<year>1983</year>
<volume>29</volume>
<publisher-name><![CDATA[American Mathematical Society]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Devaney]]></surname>
<given-names><![CDATA[R. L.]]></given-names>
</name>
</person-group>
<source><![CDATA[An Introduction to Chaotic Dynamical System]]></source>
<year>1989</year>
<publisher-name><![CDATA[AddisonWesley]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Devaney]]></surname>
<given-names><![CDATA[R. L]]></given-names>
</name>
</person-group>
<source><![CDATA[Chaos, Fractals, and Dynamics: Computer Experiments in Mathematics]]></source>
<year>1990</year>
<publisher-name><![CDATA[AddisonWesley]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fradkov]]></surname>
<given-names><![CDATA[A. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Markov]]></surname>
<given-names><![CDATA[A. Yu.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Adaptive Synchronization of Chaotic Systems Based on Speed Gradient Method and Passification]]></article-title>
<source><![CDATA[IEEE Transactions on Circuits and Systems-I]]></source>
<year>1997</year>
<volume>44</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>905-912</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gerald]]></surname>
<given-names><![CDATA[C. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Wheatley]]></surname>
<given-names><![CDATA[P. O.]]></given-names>
</name>
</person-group>
<source><![CDATA[Applied Numerical Analysis]]></source>
<year>1994</year>
<edition>Fifth</edition>
<publisher-name><![CDATA[AddisonWesley]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Holden]]></surname>
<given-names><![CDATA[A. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Muhamad]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Chaotic activity in neuronal systems]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Trappl]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybernetics and Systems Research 2]]></source>
<year>1984</year>
<page-range>245-50</page-range><publisher-loc><![CDATA[Amsterdam ]]></publisher-loc>
<publisher-name><![CDATA[Elsevier]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Holden]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Chaos]]></source>
<year>1986</year>
<publisher-name><![CDATA[Princeton University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huijberts]]></surname>
<given-names><![CDATA[H. J. C]]></given-names>
</name>
<name>
<surname><![CDATA[Nijmeijer]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Willems]]></surname>
<given-names><![CDATA[R. M. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A control perspective on communications using chaotic systems]]></article-title>
<source><![CDATA[Proceedings 37th IEEE Conference on Decision and Control]]></source>
<year>Dece</year>
<month>mb</month>
<day>er</day>
<volume>2</volume>
<page-range>1957-1962</page-range><publisher-loc><![CDATA[Tampa^eFlorida Florida]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khalil]]></surname>
<given-names><![CDATA[H. K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Non-linear Systems]]></source>
<year>2002</year>
<edition>3</edition>
<publisher-name><![CDATA[Prentice Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nijmeijer]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Mareéis]]></surname>
<given-names><![CDATA[M. Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An Observer Looks at Synchronization]]></article-title>
<source><![CDATA[IEEE Transactions on Circuits and Systems-I]]></source>
<year>1997</year>
<volume>44</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>882-890</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ogorzalek]]></surname>
<given-names><![CDATA[M.J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Taming Chaos Part I: Synchronization]]></article-title>
<source><![CDATA[IEEE T.C.S.]]></source>
<year>1993</year>
<volume>40</volume>
<page-range>693-699</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pecora]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Carroll]]></surname>
<given-names><![CDATA[T. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Driving systems with chaotic signals]]></article-title>
<source><![CDATA[Physical Review A]]></source>
<year>1991</year>
<volume>44</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>2374-2383</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pfleeger]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[Security in computing]]></source>
<year>1996</year>
<publisher-name><![CDATA[Prentice-Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schneier]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Applied Cryptography]]></source>
<year>1996</year>
<publisher-name><![CDATA[John Wiley & Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sira-Ramírez]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Cruz-Hernández]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Synchronization of Chaotic System: A Hamiltonian System Approach]]></article-title>
<source><![CDATA[International Journal of Bifurcations and Chaos]]></source>
<year>2001</year>
<volume>11</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1381-1395</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<source><![CDATA[Systems and Control Letters]]></source>
<year>1997</year>
<volume>31</volume>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<article-title xml:lang="en"><![CDATA[Chaos Synchronization and Control: Theory and Applications]]></article-title>
<source><![CDATA[IEEE Transactions on Circuits and Systems-I]]></source>
<year>1993</year>
<volume>40</volume>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<article-title xml:lang="en"><![CDATA[Chaos Synchronization and Control: Theory and Applications]]></article-title>
<source><![CDATA[IEEE Transactions on Circuits and Systems-I]]></source>
<year>1997</year>
<volume>44</volume>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
