Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
chaotic cryptography
biblio
Research on the design and implementation of two dimensional hyper chaotic sequence cipher algorithm
Submitted by grigby1 on Wed, 12/27/2017 - 1:08pm
Algorithm design and analysis
Builder FPGA
chaotic communication
chaotic cryptography
Chaotic sequence generator
Ciphers
component
composability
encryption
Entropy
Metrics
pubcrawl
Resiliency
Science of Security
Sequence cipher
Two dimensional hyper chaos
biblio
A five-dimensional chaotic system with a large parameter range and the circuit implementation of a time-switched system
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
Lu system
time-switched system
Switching circuits
Switches
switched systems
Resiliency
pubcrawl
Poincare mapping
multiple chaotic attractors
microcontrollers
microcontroller unit
Metrics
Mathematical model
Lyapunov methods
Lyapunov exponent spectrum
Lyapunov exponent
antitranslation capability
Lu
information safety
five-dimensional chaotic system
field programmable gate arrays
digital circuit
Cryptography
composability
circuit implementation
chaotic system
chaotic encryption
chaotic cryptography
chaotic communication
chaos
bifurcation diagram
bifurcation
biblio
Chaos-Based color image encryption and compression scheme using DNA complementary rule and Chinese remainder theorem
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
DNA
shuffled image
Resiliency
quantum chaotic map
pubcrawl
number theory
Metrics
Matrix converters
Image encryption and compression
image colour analysis
Image coding
encryption
DNA complementary rule
Algorithm design and analysis
data compression
Cryptography
compression algorithm
composability
color image encryption
Color
Chinese remainder theorem
chaotic cryptography
chaos
biological techniques
bioinformatics
biblio
Comparative study of two pseudo chaotic number generators for securing the IoT
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
pubcrawl
NIST
nonlinear functions
nonlinear recursive filters
PCNG2
piece-wise linear chaotic map
piecewise linear techniques
PRNGs
pseudo chaotic number generators
network security applications
PWLCmap
random number generation
recursive filters
Resiliency
second pseudo chaotic number generator
Skew Tent map
STmap
generation time
Bit rate
chaotic communication
chaotic cryptography
Ciphers
composability
coupled chaotic maps
cryptographically strong pseudo random number generators
Cryptography
binary diffusion matrix
Generators
Informatics
information security
Internet of Things
IoT
logistic map
Metrics
biblio
Efficient Hybrid Encryption System Based on Block Cipher and Chaos Generator
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
hybrid cryptosystem
video signal processing
video encryption
Symmetric Key Cryptography
Streaming media
Security analysis
Resiliency
real-time systems
pubcrawl
Multimedia systems
multimedia data
multimedia content
Metrics
hybrid video cryptosystem
hybrid encryption system
advanced encryption standard
high initial-value sensitivity
Hardware performance analysis
Hardware
encryption
CTR mode
Cryptography
composability
chaotic cryptography
chaos generators
chaos generator
Block Cipher
Algorithm design and analysis
AES
biblio
Chaos based Combined Multiple Recursive KEY Generator for Crypto-Systems
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
cryptosystems
Resiliency
pubcrawl
Plain Text
Metrics
Internet usage
Internet security
internet
information security
Generators
Encryption technique
encryption
Decryption Technique
chaos
Cryptography
composability
communication channel threats
combined multiple recursive generator
CMRG
Ciphers
cipher text
chaotic cryptography
chaotic communication
chaos theory
Chaos Function
chaos based combined multiple recursive KEY generator
biblio
ID-Based Signcryption Scheme Using Extended Chaotic Maps
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
cryptosystems
security superiorities
Resiliency
public-key cryptography
public key cryptography
pubcrawl
Metrics
identity-based signcryption scheme
Identity-based signcryption
ID-based signcryption scheme
extended chaotic maps
encryption
ECM-IBSC scheme
Algorithm design and analysis
Computation efficiency
computation efficiencies
composability
Chebyshev approximation
chaotic public-key cryptography
Chaotic maps
chaotic cryptography
chaotic communication
chaos-based discrete logarithm problem
chaos
CDL problem
biblio
A new hybrid encryption technique permuting text and image based on hyperchaotic system
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
HyprChaos
text encryption
Text
Software algorithms
Resiliency
pubcrawl
Niobium
Metrics
Image Processing
image encryption
image
chaos
hyperchaotic system
hybrid encryption technique
hybrid
Generators
encryption algorithms
encryption
Cryptography
composability
Ciphers
chaotic cryptography
biblio
Two- and three-laser chaos communications
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
optical communication
two-laser chaos communications
three-laser chaos communications
telecommunication security
Synchronization
symmetrical topology
standard short cavity close-loop laser schemes
secure transmission
secure data exchange
Resiliency
pubcrawl
privacy
chaotic communication
optical chaotic cryptography
optical chaos
Metrics
laser cavity resonators
data privacy
Cryptography
composability
Communication system security
closed loop systems
chaotic cryptography
biblio
Chaotic secure digital communication scheme using auxiliary systems
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
inclusion technique
transmitter side
transmitter parameters
telecommunication security
security
secure message transmission scheme
Resiliency
Receivers
receiver side
radio transmitters
radio receivers
pubcrawl
Observers
observer
modified Henon hyperchaotic discrete-time system
Metrics
auxiliary chaotic systems
hyperchaotic discrete primary chaotic systems
encryption function
encryption
encrypted message
dynamical left inversion technique
discrete time systems
digital signal processing
digital communication
Cryptography
composability
chaotic synchronization
chaotic secure digital communication scheme
chaotic cryptography
chaotic communication
Auxiliary transmitters
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »