Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
chaotic communication
biblio
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
Submitted by grigby1 on Fri, 01/22/2021 - 1:52pm
IKE protocol
word length 128 bit
Synchronization
security association attack
securing communications
SA
Protocols
network protocol
network communication domain
man in the middle attack
keys phase exchange
IPSec protocol
IPsec
Internet key exchange protocol
internet
chaotic cryptography
IKE
FPGA implementation
FPGA
field programmable gate arrays
DH-HEMTs
data phase transfer
Cryptography
Cryptographic Protocols
computer network security
chaotic cryptosystem solution
chaotic cryptosystem
chaotic communication
4-dimension chaotic system
pubcrawl
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 1:51pm
encryption
traditional cryptography algorithms
symmetric encryption
symmetric cipher
stream cipher
Salsa20
pseudorandom keys
NIST suite
NIST
lightweight cryptography
information technology
Information systems
hybrid modified lightweight algorithm
generated sequence keys
chaotic cryptography
data communication
cryptography algorithms PRESENT
Cryptography
Constrained Devices
computational complexity
Classification algorithms
Ciphers
cipher algorithm
chaotic system
chaotic communication
block ciphers
2D logistic map
pubcrawl
biblio
An Image Encryption Schema Based on Hybrid Optimized Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 1:50pm
hybrid optimized chaotic system
Security analysis
probability density
optimized henon mapping
optimized henon
optimisation
new 2d-logistic chaotic System
Lyapunov exponents
Logistics
image encryption schema
image encryption
image cryptosystem
Image coding
chaotic cryptography
Histograms
Henon mapping
henon chaotic system
encryption
Cryptography
Correlation
compounded chaotic system
chaotic image encryption algorithm
chaotic communication
chaos
2D logistic chaotic system
pubcrawl
biblio
Cryptography by Synchronization of Hopfield Neural Networks that Simulate Chaotic Signals Generated by the Human Body
Submitted by grigby1 on Fri, 01/22/2021 - 1:50pm
FPGA
Synchronization
synchronisation
reconfigurable hardware
reconfigurable architectures
random number sequence
random number generation
Neural networks
information security
human body
Hopfield neural networks
Hopfield neural nets
chaotic cryptography
field programmable gate arrays
encryption circuit
Dynamical Systems
dynamic systems
Cryptography
chaotic synchronization
chaotic signal simulation
chaotic communication
asymmetric cryptography method
pubcrawl
biblio
Random Number Generator Based on Skew-tent Map and Chaotic Sampling
Submitted by aekwall on Mon, 01/18/2021 - 11:22am
Oscillators
skew-tent map
field programmable analog arrays
field programmable analog array
discrete-time chaos
chaotic sampling of regular waveform
random number generator
Clocks
Trajectory
Scalability
chaotic cryptography
chaotic communication
Throughput
Generators
Metrics
pubcrawl
Resiliency
Cryptography
biblio
Digital Dynamic Chaos-Based Encryption System in a Research Project of the Department of Marine Electronics
Submitted by aekwall on Mon, 01/18/2021 - 11:22am
chaotic cryptography
signal generators
research project
digital dynamic chaos-based encryption system
digital data encryption system
Department of Marine Electronics
chaotic signal generation
computer systems
information
Trajectory
Transmitters
Scalability
chaotic communication
chaos
Mathematical model
Metrics
pubcrawl
Resiliency
encryption
Cryptography
Servers
biblio
Dynamic Chaotic Biometric Identity Isomorphic Elliptic Curve (DCBI-IEC) for Crypto Images
Submitted by aekwall on Mon, 01/18/2021 - 11:21am
Elliptic curve cryptography
user fingerprint image
statistical analysis
Resiliency
public key cryptography
pubcrawl
key sensitivity test
image encryption application
image encryption
IEC
high security level
fingerprint minutia data
fingerprint identification
feature extraction
encryption
Elliptic curves
biometric encryption
Dynamic Chaotic Biometric Identity Isomorphic Elliptic Curve
differential analysis
decryption processing
DCBI-IEC system
Chaotic maps
chaotic logistic map
chaotic cryptography
chaotic communication
chaos
biometrics (access control)
biometric identity
biometric digital identity
Metrics
Scalability
resilience
biblio
A New Four-Dimensional Chaotic System and Its Application in Speech Encryption
Submitted by aekwall on Mon, 01/18/2021 - 11:21am
chaotic communication
chaotic cryptography
Correlation
Cryptography
encryption
four-dimensional chaotic system
key space
low-dimensional chaotic encryption
Metrics
Physics
pubcrawl
Resiliency
Scalability
speech encryption
speech processing
biblio
Improving Chaotic Image Encryption Using Maps with Small Lyapunov Exponents
Submitted by aekwall on Mon, 01/18/2021 - 11:20am
chaotic communication
small Lyapunov exponents
lower bound error
largest Lyapunov exponent
finite precision
chaotic image encryption
chaotic encryption scheme
chaos-based encryption
Shannon entropy
cryptography techniques
Chaotic systems
Lyapunov methods
chaotic cryptography
Scalability
Image Processing
chaos
correlation coefficient
Entropy
Mathematical model
standards
Metrics
pubcrawl
Resiliency
encryption
Cryptography
biblio
Secure Data Packet in MANET Based Chaos-Modified AES Algorithm
Submitted by aekwall on Mon, 11/02/2020 - 2:40pm
chaotic communication
manet privacy
Wireless Ad-Hoc Networks
secure data packet
safety-sensitive applications
privacy conference meetings
passive attack
open architecture
MANET based chaos-modified AES algorithm
data packets payload
data packet
chaotic
dynamic topology
key generation
AES
Three-dimensional displays
Cryptography
Compositionality
chaos
military applications
telecommunication network topology
mobile ad hoc networks
MANET
Logistics
Metrics
privacy preservation
pubcrawl
Resiliency
telecommunication security
data privacy
encryption
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »