Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on true random number generators based on chaos
F Yu, L Li, Q Tang, S Cai, Y Song… - Discrete Dynamics in …, 2019 - Wiley Online Library
With the rapid development of communication technology and the popularization of network,
information security has been highly valued by all walks of life. Random numbers are used …
information security has been highly valued by all walks of life. Random numbers are used …
A search for good pseudo-random number generators: Survey and empirical studies
This paper targets to search so-called good generators by doing a brief survey over the
generators developed in the history of pseudo-random number generators (PRNGs), verify …
generators developed in the history of pseudo-random number generators (PRNGs), verify …
A novel 3D chaotic system with line equilibrium: multistability, integral sliding mode control, electronic circuit, FPGA implementation and its image encryption
This paper announces a novel three-dimensional chaotic system with line equilibrium and
discusses its dynamic properties such as Lyapunov exponents, phase portraits, equilibrium …
discusses its dynamic properties such as Lyapunov exponents, phase portraits, equilibrium …
Pseudorandom number generator based on novel 2D Hénon-Sine hyperchaotic map with microcontroller implementation
Recently, chaotic maps have been considered to design pseudorandom number generator
(PRNG). However, some chaotic maps present security disadvantages, such as low …
(PRNG). However, some chaotic maps present security disadvantages, such as low …
Randomness improvement of chaotic maps for image encryption in a wireless communication scheme using PIC-microcontroller via Zigbee channels
Recently, a lot of research has been done in chaotic cryptography field using different kinds
of chaotic systems, like chaotic maps, which are being considered as one of the secure and …
of chaotic systems, like chaotic maps, which are being considered as one of the secure and …
Design of pseudorandom number generator based on a controllable multi-double-scroll chaotic system
The generation, implementation, and application of multi-scroll chaotic systems have been
extensively studied due to their complex dynamic behaviors. This paper introduces a new …
extensively studied due to their complex dynamic behaviors. This paper introduces a new …
A high speed pseudo-random bit generator driven by 2D-discrete hyperchaos
Z Yang, Y Liu, Y Wu, Y Qi, F Ren, S Li - Chaos, Solitons & Fractals, 2023 - Elsevier
Abstract Pseudo-Random Number Generators (PRNGs) yielding numbers with high rates
and good randomness quality are crucial for security as networks expand in an ever …
and good randomness quality are crucial for security as networks expand in an ever …
[HTML][HTML] Pseudo-random number generator based on logistic chaotic system
L Wang, H Cheng - Entropy, 2019 - mdpi.com
In recent years, a chaotic system is considered as an important pseudo-random source to
pseudo-random number generators (PRNGs). This paper proposes a PRNG based on a …
pseudo-random number generators (PRNGs). This paper proposes a PRNG based on a …
Pseudorandom number generator based on a 5D hyperchaotic four-wing memristive system and its FPGA implementation: PRNG based on a 5D hyperchaotic four …
F Yu, L Li, B He, L Liu, S Qian, Z Zhang, H Shen… - The European Physical …, 2021 - Springer
Pseudorandom numbers are widely used in information encryption, spread spectrum
communication and other science and technology and engineering fields. Because chaos is …
communication and other science and technology and engineering fields. Because chaos is …
Design and geometric control of polynomial chaotic maps with any desired positive Lyapunov exponents
C Fan, Q Ding - Chaos, Solitons & Fractals, 2023 - Elsevier
Digital chaotic maps are severely hampered by the finite calculation accuracy of the
hardware device that is used to implement them, and their applications in cryptography and …
hardware device that is used to implement them, and their applications in cryptography and …