Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
differential attack
biblio
Generalized Chaos Synchronization Circuit Simulation and Asymmetric Image Encryption
Submitted by aekwall on Mon, 08/10/2020 - 10:50am
numerical calculations
image colour analysis
image correlation
information interaction
key sensitivity
keyspace
Lyapunov methods
Metrics
multimedia safe communications
Multisim software
network images
nonlinear equations
nonsymmetric identity authentication
numerical analysis
Human behavior
numerical simulation
pubcrawl
quadratic variables
Resiliency
RGB digital image secure communication scheme
statistical analysis
statistical average
structural circuits
synchronisation
Synchronization
synchronous circuits
Trajectory
unpredictable synchronization state
diffeomorphism function
asymmetric image
bifurcation
chaos
chaotic communication
chaotic system
circuit simulation
Color image
complex dynamic behavior
Compositionality
confidential information
conventional chaos systems
conventional drive system
Cryptography
Asymmetric Encryption
differential attack
digital image
digital images
encryption
encryption algorithm
flexible control parameters
four-dimensional diffeomorphism function
four-dimensional nonlinear dynamic equation
GCS response system
generalized chaos synchronization circuit simulation
generalized chaos synchronization theory
generalized response system
Generalized synchronization
biblio
A Proposed Serpent-Elliptic Hybrid Cryptosystem For Multimedia Protection
Submitted by grigby1 on Fri, 02/08/2019 - 4:21pm
image encryption
symmetric encryption scheme
statistical attack
serpent-elliptic hybrid cryptosystem
Serpent algorithm
SERPENT
Resiliency
resilience
public key cryptography
pubcrawl
Multimedia systems
multimedia protection
Metrics
insecure networks
insecure channel
information security
Asymmetric Encryption
hybrid cryptosystem
Human behavior
encryption quality
encryption
Elliptic curves
Elliptic curve cryptography
differential attack
data encapsulation scheme
data encapsulation
Correlation
Compositionality
composability
asymmetric schemes key distribution
asymmetric encryption scheme