Integrated chaotic systems for image encryption
To improve the randomicity behaviors of some existing chaotic maps, this paper proposes
two integrated chaotic systems (ICS), which conduct cascade, nonlinear combination, and …
two integrated chaotic systems (ICS), which conduct cascade, nonlinear combination, and …
Cascade chaotic system with applications
Chaotic maps are widely used in different applications. Motivated by the cascade structure in
electronic circuits, this paper introduces a general chaotic framework called the cascade …
electronic circuits, this paper introduces a general chaotic framework called the cascade …
An efficient pixel-level chaotic image encryption algorithm
G Ye, C Pan, X Huang, Q Mei - Nonlinear Dynamics, 2018 - Springer
In this paper, a new and efficient pixel-level image encryption algorithm is presented. In
contrast to the traditional permutation–diffusion architecture, the proposed method enhances …
contrast to the traditional permutation–diffusion architecture, the proposed method enhances …
Dynamic analysis of digital chaotic maps via state-map** networks
Chaotic dynamics is widely used to design pseudo-random number generators and for other
applications, such as secure communications and encryption. This paper aims to study the …
applications, such as secure communications and encryption. This paper aims to study the …
Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview
We provide an overview of selected crypto‐hardware devices, with a special reference to the
lightweight electronic implementation of encryption/decryption schemes, hash functions, and …
lightweight electronic implementation of encryption/decryption schemes, hash functions, and …
Enhanced digital chaotic maps based on bit reversal with applications in random bit generators
Digital chaotic maps are becoming increasingly popular in the area of cryptography due to
commonalities but have drawbacks which adversely effect security strength. Thus …
commonalities but have drawbacks which adversely effect security strength. Thus …
Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications
Symmetric encryption has been considered as one of the essential means of ensuring
security of end to end communication. The robustness and strength of modern day block …
security of end to end communication. The robustness and strength of modern day block …
Trends in hardware security: From basics to ASICs
M Alioto - IEEE Solid-State Circuits Magazine, 2019 - ieeexplore.ieee.org
This article presents an excerpt of the tutorial on hardware security delivered at the 2019
IEEE International Solid-State Circuits Conference and an introduction to a performance …
IEEE International Solid-State Circuits Conference and an introduction to a performance …
Periodicity Analysis of the Logistic Map Over Ring
X Lu, EY **e, C Li - International Journal of Bifurcation and Chaos, 2023 - World Scientific
Periodicity analysis of sequences generated by a deterministic system is a long-standing
challenge in both theoretical research and engineering applications. To overcome the …
challenge in both theoretical research and engineering applications. To overcome the …
Counteracting dynamical degradation of a class of digital chaotic systems via Unscented Kalman Filter and perturbation
Theoretically, any chaotic system or chaotic map has ideal complex dynamics. However,
because of the finite precision of simulation software and digital devices during …
because of the finite precision of simulation software and digital devices during …