Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing
暂无分享,去创建一个
Sanjay Kumar | Shalini Stalin | Piyush Kumar Shukla | Ankur Khare | M. A. Rizvi | Murtaza Abbas Rizvi | P. Shukla | Sanjay Kumar | S. Stalin | Ankur Khare
[1] Jing Yu,et al. Cryptography with two discretized chaotic maps , 2013, 2013 8th International Conference on Computer Science & Education.
[2] Ljupco Kocarev,et al. Theory and practice of chaotic cryptography , 2007 .
[3] William L. Ditto,et al. Principles and applications of chaotic systems , 1995, CACM.
[4] Peng Shi,et al. Sampled-Data Synchronization of Chaotic Lur'e Systems With Time Delays , 2013, IEEE Transactions on Neural Networks and Learning Systems.
[5] Zhong Zhang,et al. The research of hardware encryption card based on chaos , 2013, PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System.
[6] Wolfgang Schwarz,et al. General Design Rules for Chaos-Based Encryption Systems , 2005 .
[7] Chun-Liang Lin,et al. Text encryption using ECG signals with chaotic Logistic map , 2010, 2010 5th IEEE Conference on Industrial Electronics and Applications.
[8] Tao Yang,et al. A SURVEY OF CHAOTIC SECURE COMMUNICATION SYSTEMS , 2004 .
[9] Xinhua Wu,et al. A new digital anti-counterfeiting scheme based on chaotic cryptography , 2012, 2012 International Conference on ICT Convergence (ICTC).
[10] Jinhong Luo,et al. Research of Chaos Encryption Algorithm Based on Logistic Mapping , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[11] Ercan Solak,et al. Cryptanalysis of a cryptosystem based on discretized two-dimensional chaotic maps , 2008 .
[12] Jing Yu,et al. Selection of chaotic states in cryptosystem based on chaos with differential analysis , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).
[13] S. Durga Bhavani,et al. Symmetric encryption using logistic map , 2012, 2012 1st International Conference on Recent Advances in Information Technology (RAIT).
[14] Kwok-Wo Wong,et al. Embedding Compression in Chaos-Based Cryptography , 2008, IEEE Transactions on Circuits and Systems II: Express Briefs.
[15] Safwan El Assad,et al. Chaos based improvement of the security of ZigBee and Wi-Fi networks used for industrial controls , 2011, International Conference on Information Society (i-Society 2011).
[16] Leon O. Chua,et al. Secure Communications via Chaotic Synchronization II: Noise Reduction by Cascading Two Identical Receivers , 1993 .
[17] K. Ramar,et al. Public Key Cryptosystems Based on Chaotic-Chebyshev Polynomials , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[18] Safwan El Assad,et al. A New Chaotic Encryption Algorithm to Enhance the Security of ZigBee and Wi-Fi networks , 2012 .
[19] A.K. Aboulsoud,et al. Cryptographic schemes using chaotic system , 2008, 2008 National Radio Science Conference.
[20] Jing Yu,et al. A novel authentication scheme based on chaos , 2013, 2013 8th International Conference on Computer Science & Education.
[21] Jing Yu,et al. Application of unicity distance in a cryptosystem based on chaos , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).
[22] Fei Peng,et al. An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos , 2013, IEEE Transactions on Information Forensics and Security.
[23] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[24] Abbas Dandache,et al. New hardware Cryptosystem based chaos for the secure real-time of embedded applications , 2011, 2011 IEEE Workshop on Signal Processing Systems (SiPS).
[25] Yong-Peng Xiao,et al. An Encrypt Approach using Dynamic Encrypt Keys , 2007, 2007 International Conference on Machine Learning and Cybernetics.
[26] Chin-Hsing Chen,et al. A chaos-based multiple security encryption system for compressed video , 2011 .
[27] Guanrong Chen,et al. Block cipher design: Generalized single-use-algorithm based on chaos , 2011 .
[28] X. Mou,et al. Improving security of a chaotic encryption approach , 2001, Physics Letters A.
[29] Joseph Zambreno,et al. A chaotic encryption scheme for real-time embedded systems: design and implementation , 2013, Telecommun. Syst..
[30] Zhiliang Zhu,et al. Cryptanalysis and Improvement on a Block Encryption Algorithm Based on Dynamic Sequences of Multiple Chaotic Systems , 2009, 2010 International Workshop on Chaos-Fractal Theories and Applications.
[31] Ljupco Kocarev,et al. Chaos-based Cryptography: an overview , 2005 .
[32] Shujun Li,et al. Determination of the Parameters for a Lorenz System and Application to Break the Security of Two-channel Chaotic Cryptosystems , 2008 .
[33] Mohamed I. Sobhy,et al. Chaotic algorithms for data encryption , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[34] L. Kocarev,et al. Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .
[35] Ercan Solak. Cryptanalysis of Observer Based Discrete-Time Chaotic Encryption Schemes , 2005, Int. J. Bifurc. Chaos.
[36] Safwan El Assad,et al. Chaos Based Information Hiding and Security , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[37] P. Borne,et al. Synchronization of discrete-time hyperchaotic maps based on aggregation technique for encryption , 2012, International Multi-Conference on Systems, Sygnals & Devices.
[38] William Puech,et al. A New Joint Lossless Compression and Encryption Scheme Combining a Binary Arithmetic Coding With a Pseudo Random Bit Generator , 2010 .
[39] A. Palacios,et al. Cryptography with cycling chaos , 2002 .
[40] Chuandong Li,et al. A secure communication scheme based on symbolic dynamics , 2004, 2004 International Conference on Communications, Circuits and Systems (IEEE Cat. No.04EX914).
[41] G. Álvarez,et al. Cryptanalysis of a chaotic encryption system , 2000 .
[42] Y. Mu,et al. Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding , 2013, Journal of Lightwave Technology.
[43] Wolfgang A. Halang,et al. Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey , 2007, ArXiv.
[44] Stamatios V. Kartalopoulos. Chaotic quantum cryptography: The ultimate for network security , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[45] Jing Pan,et al. The Research of Chaos-based SMS Encryption in Mobile Phone , 2012, 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control.
[46] O. A. Fakolujo,et al. LORENZ-BASED CHAOTIC SECURE COMMUNICATION SCHEMES , 2011 .
[47] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[48] Long Jye Sheu,et al. A Two-Channel Secure Communication Using Fractional Chaotic Systems , 2010 .
[49] Ismail Mansour,et al. Evaluation of a Fast Symmetric Cryptographic Algorithm Based on the Chaos Theory for Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[50] S. Li,et al. Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.
[51] Jiashu Zhang,et al. Cryptanalysis of the chaotic-based key agreement protocols , 2008, 2008 International Symposium on Biometrics and Security Technologies.
[52] S. Ge,et al. Adaptive synchronization of uncertain chaotic systems via backstepping design , 2001 .
[53] Roland Schmitz,et al. Use of chaotic dynamical systems in cryptography , 2001, J. Frankl. Inst..
[54] Ilango Paramasivam,et al. Higher dimensional chaos for Audio encryption , 2013, 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[55] Kun Li,et al. A new chaotic secure communication system , 2003, IEEE Trans. Commun..
[56] Kwok-Wo Wong,et al. Simultaneous Arithmetic Coding and Encryption Using Chaotic Maps , 2010, IEEE Transactions on Circuits and Systems II: Express Briefs.
[57] Daniel Curiac,et al. Chaos-Based Cryptography: End of the Road? , 2007, The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007).
[58] Sundarapandian Vaidyanathan,et al. COMPLETE SYNCHRONIZATION OF HYPERCHAOTIC XU AND HYPERCHAOTIC LÜ SYSTEMS VIA ACTIVE CONTROL , 2012 .
[59] Chenhui Jin,et al. Cryptanalysis of a Chaos-based Stream Cipher , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[60] Rogelio Hasimoto Beltrán. Low-complexity chaotic encryption system , 2009 .
[61] Brad Aimone,et al. Chaotic Circuits and Encryption , 2006 .