Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
chaotic cryptography
biblio
Mixed chaotic maps based encryption for high crypto secrecy
Submitted by grigby1 on Wed, 12/27/2017 - 12:09pm
Logistics
Transposition
Substitution
statistical analysis
standards
simple chaotic maps
secure image encryption techniques
secure image encryption
Resiliency
pubcrawl
mixed chaotic maps
Metrics
chaos
initial conditions
Image Processing
high crypto secrecy
encryption
Elliptic curve cryptography
Cryptography
cryptographic algorithms
composability
chaotic cryptography
chaotic communication
chaos based image encryption technique
biblio
Reversible Chaotic Encryption Techniques For Images
Submitted by grigby1 on Wed, 12/27/2017 - 12:09pm
Image Processing
UACI
tent map
Signal processing algorithms
signal processing
reversible chaotic encryption technique
Resiliency
pubcrawl
PSNR
pixel shuffling
NPCR
MSE
Metrics
Logistics
logistic map
Arnold cat map
image pixels
image encryption security
image encryption
encryption
Cryptography
composability
civilian systems
Chaotic techniques
Chaotic maps
chaotic cryptography
chaotic communication
Cats
Arnold's cat map
biblio
Quantum color image encryption based on multiple discrete chaotic systems
Submitted by grigby1 on Wed, 12/27/2017 - 12:09pm
logistic Chebyshev map
XOR operation
statistical attacks
Resiliency
quantum image encryption algorithm
quantum encryption algorithm
quantum cryptography
quantum controlled-NOT image
quantum color image encryption
pubcrawl
multiple discrete chaotic systems
Metrics
Logistics
Algorithm design and analysis
image colour analysis
Histograms
encryption process
encryption
differential attacks
composability
Color
Chebyshev approximation
chaotic logistic map
chaotic cryptography
chaos
asymmetric tent map
biblio
Novel remote authentication protocol using heart-signals with chaos cryptography
Submitted by grigby1 on Wed, 12/27/2017 - 12:09pm
Heart beat
session-oriented attacks
secure encryption
Resiliency
remote entity authentication protocol
pubcrawl
one-time pad encryption
Metrics
heart-signals
heart biometrics randomness
authentication
feature extraction
encryption
Cryptographic Protocols
composability
chaotic logistic maps
chaotic cryptography
chaos cryptography
chaos
biometrics (access control)
biblio
A random number generation method based on discrete time chaotic maps
Submitted by grigby1 on Wed, 12/27/2017 - 12:09pm
FPAA-FPGA
Steganography
statistical testing
statistical test
Resiliency
random number generator
random number generation method
random number generation
pubcrawl
piecewise linear techniques
piecewise linear one dimensional discrete time chaotic maps
NIST 800-22 randomness test
Metrics
Mathematical model
bifurcation
FIPS 140-2
field programmable gate arrays
field programmable digital arrays
field programmable analogue arrays
field programmable analog arrays
Entropy
Cryptography
Correlation
composability
chaotic signal
chaotic cryptography
chaos
biblio
A new key generator for data encryption using chaos in digital filter
Submitted by grigby1 on Wed, 12/27/2017 - 12:08pm
encryption
Resiliency
pubcrawl
private key system
order system
Metrics
key generator system
key generator
internal key
initial coefficients value condition
IIR filters
high sensitive system
Generators
external key
accuracy key test
Digital filters
digital filter
Data Security
data encryption
Cryptography
composability
chaotic encryption
chaotic cryptosystem
chaotic cryptography
chaotic communication
chaos
appropriate key sensitivity
biblio
Chaos-based video steganography
Submitted by grigby1 on Wed, 12/27/2017 - 12:08pm
Metrics
video coding
Tinkerbell 2D chaotic map
Tinkerbell
Steganography
shift registers
Resiliency
randomized data hiding points
pubcrawl
PSNR
NonLinear Feedback Shift Register
nonlinear dynamics physics
NLFSR
Mutual information
chaos
information technology
Image Steganography
Image color analysis
frame embedding position
data hiding limit
data hiding
Cryptography
composability
chaotic map
chaotic cryptography
chaotic communication
chaos-based video steganography mechanism
biblio
Novel normalization technique for chaotic Pseudo-random number generators based on semi-implicit ODE solvers
Submitted by grigby1 on Wed, 12/27/2017 - 12:08pm
Resiliency
normalization technique
numerical integration
numerical simulation
numerical solution
probability
pseudo-random number generator
pseudorandom binary sequence generator
pubcrawl
random number generation
Random sequences
normalization factor
Rössler attractors
Rössler system
semi-implicit ODE solver
semiimplicit ODE solvers
semiimplicit symmetric composition D-method
state variables values
statistical testing
Thomas attractor
Thomas attractors
correlation analysis methods
chaotic communication
chaotic cryptography
chaotic differential equations
chaotic ODEs
chaotic pseudorandom number generators
chaotic system
composability
Correlation
Correlation analysis
chaos
differential equations
dynamical chaos
generation process
generator architecture
Generators
Metrics
NIST
NIST statistical test suite
nonlinear control systems
biblio
Mathematical cryptanalysis of \#x201C;personalized information encryption using ECG signals with chaotic functions \#x201D;
Submitted by grigby1 on Wed, 12/27/2017 - 12:08pm
Henon map
text encryption
text analysis
Secret key
Resiliency
pubcrawl
Physics
personalized information encryption
Optics
numerical simulation
Metrics
mathematical cryptanalysis
image data encryption
Heuristic algorithms
Henon mapping
bifurcation
Electrocardiography
electrocardiogram
ECG signals
data encryption algorithm
cryptosystem
Cryptography
cryptanalysis
composability
Chosen-plaintext attack
chaotic system
chaotic functions
chaotic cryptography
chaos
biblio
Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain
Submitted by grigby1 on Wed, 12/27/2017 - 12:08pm
Entropy
Resiliency
pubcrawl
Mutual information
Metrics
Logistics
information security
Image color analysis
frequency-domain analysis
chaotic cryptography
encryption
Discrete Fourier transforms
digital images
Deterministic Encryption
Correlation
composability
chaotic encryption
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »