Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
chaotic cryptography
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by grigby1 on Fri, 01/22/2021 - 1:52pm
internet
Transmitters
time series
telecommunication channels
Receivers
public communication channel
Oscillators
network security
multiple chaotic orbits
multimedia signals
multimedia data
Multimedia communication
Lyapunov-based adaptive technique
Lyapunov methods
chaotic cryptography
Encryption technique
Cryptography
crypto-analysis methods
Communication channels
chaotic nonautonomous Duffing oscillator
chaotic communication
chaos-based cryptography
chaos
bandwidth allocation
adaptive signal processing
8-bit ASCII code
pubcrawl
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by grigby1 on Fri, 01/22/2021 - 1:52pm
military radio
wireless mobile communication
voice encryption
voice data security
voice communication
trunked radio
telecommunication technology
telecommunication security
security systems
Receivers
multiple circular chaotic permutation
multiple circular
multicircular permutations
chaotic cryptography
GSM network
GSM
Global System for Mobile
end-to-end voice encryption
encryption
dynamic keys
Cryptography
chaotic communication
chaotic algorithm
cellular technologies
cellular radio
pubcrawl
biblio
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
Submitted by grigby1 on Fri, 01/22/2021 - 1:52pm
IKE protocol
word length 128 bit
Synchronization
security association attack
securing communications
SA
Protocols
network protocol
network communication domain
man in the middle attack
keys phase exchange
IPSec protocol
IPsec
Internet key exchange protocol
internet
chaotic cryptography
IKE
FPGA implementation
FPGA
field programmable gate arrays
DH-HEMTs
data phase transfer
Cryptography
Cryptographic Protocols
computer network security
chaotic cryptosystem solution
chaotic cryptosystem
chaotic communication
4-dimension chaotic system
pubcrawl
biblio
Improvement of PRIME Protocol Based on Chaotic Cryptography
Submitted by grigby1 on Fri, 01/22/2021 - 1:51pm
AES algorithm
AES encryption algorithm
carrier transmission on power lines
chaotic cryptography
Chebyshev approximation
Cryptographic Protocols
encryption
key expansion process
narrowband power line communication protocol
Power line communications
PRIME protocol
Protocols
pubcrawl
biblio
Comparison of Cryptography by Chaotic Neural Network and by AES
Submitted by grigby1 on Fri, 01/22/2021 - 1:51pm
AES cipher
AES ciphering
chaos
chaotic cryptography
Chaotic maps
chaotic neural network approach
chaotic neural networks
Cryptography
neural nets
pubcrawl
short plaintexts
text encryption
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 1:51pm
encryption
traditional cryptography algorithms
symmetric encryption
symmetric cipher
stream cipher
Salsa20
pseudorandom keys
NIST suite
NIST
lightweight cryptography
information technology
Information systems
hybrid modified lightweight algorithm
generated sequence keys
chaotic cryptography
data communication
cryptography algorithms PRESENT
Cryptography
Constrained Devices
computational complexity
Classification algorithms
Ciphers
cipher algorithm
chaotic system
chaotic communication
block ciphers
2D logistic map
pubcrawl
biblio
An Image Encryption Schema Based on Hybrid Optimized Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 1:50pm
hybrid optimized chaotic system
Security analysis
probability density
optimized henon mapping
optimized henon
optimisation
new 2d-logistic chaotic System
Lyapunov exponents
Logistics
image encryption schema
image encryption
image cryptosystem
Image coding
chaotic cryptography
Histograms
Henon mapping
henon chaotic system
encryption
Cryptography
Correlation
compounded chaotic system
chaotic image encryption algorithm
chaotic communication
chaos
2D logistic chaotic system
pubcrawl
biblio
Cryptography by Synchronization of Hopfield Neural Networks that Simulate Chaotic Signals Generated by the Human Body
Submitted by grigby1 on Fri, 01/22/2021 - 1:50pm
FPGA
Synchronization
synchronisation
reconfigurable hardware
reconfigurable architectures
random number sequence
random number generation
Neural networks
information security
human body
Hopfield neural networks
Hopfield neural nets
chaotic cryptography
field programmable gate arrays
encryption circuit
Dynamical Systems
dynamic systems
Cryptography
chaotic synchronization
chaotic signal simulation
chaotic communication
asymmetric cryptography method
pubcrawl
biblio
A Cryptographic Confusion Primitive Based on Lotka–Volterra Chaotic System and Its Practical Applications in Image Encryption
Submitted by aekwall on Mon, 01/18/2021 - 11:23am
Scalability
Cryptography
Resiliency
pubcrawl
Metrics
chaos
Image Processing
image encryption
chaotic cryptography
substitution box
cryptographic confusion primitive
cryptographic substitution box structure
image encryption algorithm
Lotka-Volterra chaotic system
substitution box structure
biblio
The Design of S-box Based on Combined Chaotic Map
Submitted by aekwall on Mon, 01/18/2021 - 11:23am
S-box
substitution box
S-box construction method
one-dimension chaotic map
nonlinear component
logistic map
lightweight block cipher
combined chaotic map
sine map
Scalability
cryptographic algorithm
chaotic cryptography
chaos
probability
Metrics
pubcrawl
Resiliency
Cryptography
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »