Integrated chaotic systems for image encryption

R Lan, J He, S Wang, T Gu, X Luo - Signal Processing, 2018 - Elsevier
To improve the randomicity behaviors of some existing chaotic maps, this paper proposes
two integrated chaotic systems (ICS), which conduct cascade, nonlinear combination, and …

Cascade chaotic system with applications

Y Zhou, Z Hua, CM Pun… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Chaotic maps are widely used in different applications. Motivated by the cascade structure in
electronic circuits, this paper introduces a general chaotic framework called the cascade …

An efficient pixel-level chaotic image encryption algorithm

G Ye, C Pan, X Huang, Q Mei - Nonlinear Dynamics, 2018 - Springer
In this paper, a new and efficient pixel-level image encryption algorithm is presented. In
contrast to the traditional permutation–diffusion architecture, the proposed method enhances …

Dynamic analysis of digital chaotic maps via state-map** networks

C Li, B Feng, S Li, J Kurths… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Chaotic dynamics is widely used to design pseudo-random number generators and for other
applications, such as secure communications and encryption. This paper aims to study the …

Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview

AJ Acosta, T Addabbo… - International Journal of …, 2017 - Wiley Online Library
We provide an overview of selected crypto‐hardware devices, with a special reference to the
lightweight electronic implementation of encryption/decryption schemes, hash functions, and …

Enhanced digital chaotic maps based on bit reversal with applications in random bit generators

M Alawida, A Samsudin, JS Teh - Information Sciences, 2020 - Elsevier
Digital chaotic maps are becoming increasingly popular in the area of cryptography due to
commonalities but have drawbacks which adversely effect security strength. Thus …

Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications

M Ahmad, IA Khaja, A Baz, H Alhakami… - IEEE Access, 2020 - ieeexplore.ieee.org
Symmetric encryption has been considered as one of the essential means of ensuring
security of end to end communication. The robustness and strength of modern day block …

Trends in hardware security: From basics to ASICs

M Alioto - IEEE Solid-State Circuits Magazine, 2019 - ieeexplore.ieee.org
This article presents an excerpt of the tutorial on hardware security delivered at the 2019
IEEE International Solid-State Circuits Conference and an introduction to a performance …

Periodicity Analysis of the Logistic Map Over Ring

X Lu, EY **e, C Li - International Journal of Bifurcation and Chaos, 2023 - World Scientific
Periodicity analysis of sequences generated by a deterministic system is a long-standing
challenge in both theoretical research and engineering applications. To overcome the …

Counteracting dynamical degradation of a class of digital chaotic systems via Unscented Kalman Filter and perturbation

Y Luo, Y Liu, J Liu, S Tang, J Harkin, Y Cao - Information Sciences, 2021 - Elsevier
Theoretically, any chaotic system or chaotic map has ideal complex dynamics. However,
because of the finite precision of simulation software and digital devices during …