Dynamic analysis of digital chaotic maps via state-map** networks

C Li, B Feng, S Li, J Kurths… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Chaotic dynamics is widely used to design pseudo-random number generators and for other
applications, such as secure communications and encryption. This paper aims to study the …

Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview

AJ Acosta, T Addabbo… - International Journal of …, 2017 - Wiley Online Library
We provide an overview of selected crypto‐hardware devices, with a special reference to the
lightweight electronic implementation of encryption/decryption schemes, hash functions, and …

Chaos-based bitwise dynamical pseudorandom number generator on FPGA

M Garcia-Bosque, A Pérez-Resa… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
In this paper, a new pseudorandom number generator (PRNG) based on the logistic map
has been proposed. To prevent the system to fall into short period orbits as well as …

Random property enhancement of a 1D chaotic PRNG with finite precision implementation

RA Elmanfaloty, E Abou-Bakr - Chaos, Solitons & Fractals, 2019 - Elsevier
The random-like behavior of chaotic systems make them perfect candidates for the core of
numerous pseudo-random number generators. The coupling of two or more chaotic maps …

A study of chaotic maps producing symmetric distributions in the fish school search optimization algorithm with exponential step decay

LA Demidova, AV Gorchakov - Symmetry, 2020 - mdpi.com
Inspired by the collective behavior of fish schools, the fish school search (FSS) algorithm is a
technique for finding globally optimal solutions. The algorithm is characterized by its …

A hybrid chaotic encryption ASIC with dynamic precision for internet of things

J Feng, J Wang, Y Zhu, K Han - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
With the rapid development of the Internet of Things (IoT), device and data security has
attracted huge academic attention in recent years since conventional security methods are …

Generalized Hardware Post‐processing Technique for Chaos‐Based Pseudorandom Number Generators

ML Barakat, AS Mansingka, AG Radwan… - ETRI …, 2013 - Wiley Online Library
This paper presents a generalized post‐processing technique for enhancing the
pseudorandomness of digital chaotic oscillators through a nonlinear XOR‐based operation …

A hybrid chaotic encryption scheme for wireless body area networks

S Fan, K Li, Y Zhang, H Tan, Q Fang, K Han… - IEEE Access, 2020 - ieeexplore.ieee.org
Wireless body area network is a low-power and high-security wireless communication
protocol specially used in the medical environment. It requires a highly secure encryption …

Difference map and its electronic circuit realization

M García-Martínez, I Campos-Cantón… - Nonlinear …, 2013 - Springer
In this paper we study the dynamical behavior of the one-dimensional discrete-time system,
the so-called iterated map. Namely, a bimodal quadratic map is introduced which is …

Finite precision logistic map between computational efficiency and accuracy with encryption applications

WS Sayed, AG Radwan, AA Rezk, HAH Fahmy - Complexity, 2017 - Wiley Online Library
Chaotic systems appear in many applications such as pseudo‐random number generation,
text encryption, and secure image transfer. Numerical solutions of these systems using …