G. Alvarez, F. Montoya, M. Romera, and G. Pastor, Cryptanalysis of a discrete chaotic cryptosystem using external key, Physics Letters A, vol.319, issue.3-4, pp.319-334, 2003.
DOI : 10.1016/j.physleta.2003.10.044

G. A. Alvarez and L. B. Shujun, Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption, Communications in Nonlinear Science and Numerical Simulation, vol.14, issue.11, pp.3743-3749, 2009.
DOI : 10.1016/j.cnsns.2009.02.033

G. Chen, Y. Mao, and C. K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos, Solitons & Fractals, vol.21, issue.3, pp.749-761, 2004.
DOI : 10.1016/j.chaos.2003.12.022

F. Chiaraluce and L. Ciccarelli, A new chaotic algorithm for video encryption, IEEE Transactions on Consumer Electronics, vol.48, issue.4, pp.838-844, 2002.
DOI : 10.1109/TCE.2003.1196410

K. Dajani and C. Kraaikamp, The Mother of All Continued Fractions, Colloquium Math, pp.84-85109, 2000.

Y. Hartono, C. Kraaikamp, and F. Schweiger, Algebraic and ergodic properties of a new continued fraction algorithm with non-decreasing partial quotients, Journal de Th??orie des Nombres de Bordeaux, vol.14, issue.2, pp.497-516, 2002.
DOI : 10.5802/jtnb.371

A. Kanso and N. Smaoui, Logistic chaotic maps for binary numbers generations, Chaos, Solitons & Fractals, vol.40, issue.5, pp.2557-2568, 2009.
DOI : 10.1016/j.chaos.2007.10.049

L. Kocarev, Chaos-based cryptography: a brief overview, IEEE Circuits and Systems Magazine, vol.1, issue.3, pp.6-21, 2001.
DOI : 10.1109/7384.963463

H. Li and J. Zhang, A secure and efficient entropy coding based on arithmetic coding, Communications in Nonlinear Science and Numerical Simulation, vol.14, issue.12, pp.4304-4318, 2009.
DOI : 10.1016/j.cnsns.2009.03.003

S. Li and X. Mou, Improving security of a chaotic encryption approach, Physics Letters A, vol.290, issue.3-4, pp.127-133, 2001.
DOI : 10.1016/S0375-9601(01)00612-0

S. Li, X. Mou, Y. Cai, Z. Ji, and J. Zhang, On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision, Computer Physics Communications, vol.153, issue.1, pp.52-58, 2003.
DOI : 10.1016/S0010-4655(02)00875-5

S. G. Lian, J. Sun, and Z. Wang, A block cipher based on a suitable use of the chaotic standard map, Chaos, Solitons & Fractals, vol.26, issue.1, pp.117-129, 2005.
DOI : 10.1016/j.chaos.2004.11.096

L. Lorentzen and H. Waadeland, Continued Fractions with Applications, 1992.

S. S. Maniccam and N. G. Bourbakis, Lossless image compression and encryption using SCAN, Pattern Recognition, vol.34, issue.6, pp.1229-1245, 2001.
DOI : 10.1016/S0031-3203(00)00062-5

B. Mi, X. Liao, and Y. Chen, A novel chaotic encryption scheme based on arithmetic coding, Chaos, Solitons & Fractals, vol.38, issue.5, pp.1523-1531, 2008.
DOI : 10.1016/j.chaos.2007.01.133

V. Patidar, N. K. Parekk, and K. K. Sud, A new substitution???diffusion based image cipher using chaotic standard and logistic maps, Communications in Nonlinear Science and Numerical Simulation, vol.14, issue.7, pp.3056-3075, 2009.
DOI : 10.1016/j.cnsns.2008.11.005

V. Patidar and K. K. Sud, A Novel Pseudo Random Bit Generator Based on Chaotic Standard Map and its Testing, Electronic Journal of Theoretical Physics, vol.6, issue.20, pp.327-344, 2009.

R. B. Seidensticker, Continued fractions for high-speed and high-accuracy computer arithmetic, 1983 IEEE 6th Symposium on Computer Arithmetic (ARITH), 1983.
DOI : 10.1109/ARITH.1983.6158099

J. Vuillemin, Exact Real Computer Arithmetic with Continued Fractions, INRIA Report, vol.760, 1987.
URL : https://hal.archives-ouvertes.fr/inria-00075792

J. Wei, X. F. Liao, K. W. Wong, and T. Zhout, Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps, Communications in Nonlinear Science and Numerical Simulation, vol.12, issue.5, pp.814-836, 2007.
DOI : 10.1016/j.cnsns.2005.06.001

K. W. Wong, B. S. Kwoka, and C. H. Yuena, An efficient diffusion approach for chaos-based image encryption, Chaos, Solitons & Fractals, vol.41, issue.5, pp.2652-2663, 2008.
DOI : 10.1016/j.chaos.2008.09.047

X. G. Wu, H. P. Hu, and B. L. Zhang, Analyzing and improving a chaotic encryption method, Chaos, Solitons & Fractals, vol.22, issue.2, pp.367-373, 2004.
DOI : 10.1016/j.chaos.2004.02.009

T. Yang, A Survey of Chaotic Secure Communication Systems, Journal of Computational Cognition, vol.2, issue.2, pp.81-130, 2004.

L. Zhang, X. Liao, and X. Wang, An image encryption approach based on chaotic maps, Chaos, Solitons & Fractals, vol.24, issue.3, pp.759-765, 2005.
DOI : 10.1016/j.chaos.2004.09.035

H. Zhou and X. T. Ling, Problems with the chaotic inverse system encryption approach, IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol.44, issue.3, pp.268-271, 1997.
DOI : 10.1109/81.557386

H. Zhou, X. T. Ling, and J. Yu, Secure Communication Via one-Dimensional Chaotic Inverse Systems, IEEE Circuits and Systems, vol.2, pp.1029-1032, 1997.