Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Applied cryptography using chaos function for fast digital logic-based systems in ubiquitous computing
Recently, chaotic dynamics-based data encryption techniques for wired and wireless
networks have become a topic of active research in computer science and network security …
networks have become a topic of active research in computer science and network security …
[KNIHA][B] Image encryption: a communication perspective
FE Abd El-Samie, HEH Ahmed, IF Elashry… - 2013 - books.google.com
Presenting encryption algorithms with diverse characteristics, Image Encryption: A
Communication Perspective examines image encryption algorithms for the purpose of …
Communication Perspective examines image encryption algorithms for the purpose of …
Cryptanalysis of an ergodic chaotic cipher
In recent years, a growing number of cryptosystems based on chaos have been proposed,
many of them fundamentally flawed by a lack of robustness and security. In this Letter, we …
many of them fundamentally flawed by a lack of robustness and security. In this Letter, we …
Baptista-type chaotic cryptosystems: problems and countermeasures
In 1998, MS Baptista proposed a chaotic cryptosystem, which has attracted much attention
from the chaotic cryptography community: some of its modifications and also attacks have …
from the chaotic cryptography community: some of its modifications and also attacks have …
[PDF][PDF] Analyses and new designs of digital chaotic ciphers
SJ Li - 2003 - openresearch.surrey.ac.uk
Since 1980s, the idea of using digital chaotic systems to design new ciphers has attracted
more and more attention. The use of chaos in cryptography depends on the natural relation …
more and more attention. The use of chaos in cryptography depends on the natural relation …
Cryptanalysis of dynamic look-up table based chaotic cryptosystems
In recent years many chaotic cryptosystems based on Baptista's seminal work have been
proposed. We analyze the security of two of the newest and most interesting ones, which …
proposed. We analyze the security of two of the newest and most interesting ones, which …
Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
Recently two encryption schemes were proposed by combining circular bit shift and XOR
operations, under the control of a pseudorandom bit sequence (PRBS) generated from a …
operations, under the control of a pseudorandom bit sequence (PRBS) generated from a …
A new image encryption algorithm based on optimized Lorenz chaotic system
T Li, W Yan, Z Chi - Concurrency and Computation: Practice …, 2022 - Wiley Online Library
In this article, an improved Lorenz system was constructed, in the first stage, a nonlinear
term in general Lorenz system was replaced by the sum of term of exponential function and …
term in general Lorenz system was replaced by the sum of term of exponential function and …
A shifted logistic map
In this paper, the peculiarities of a quadratic map are investigated, unveiling the hidden
relationship with the classical logistic map. Moreover, the improvements in generating odd …
relationship with the classical logistic map. Moreover, the improvements in generating odd …
A cycling chaos-based cryptic-free algorithm for image steganography
In recent years, chaotic systems have surfaced to become an important field in
steganographic matters. In this paper, we present a simple cryptic-free least significant bits …
steganographic matters. In this paper, we present a simple cryptic-free least significant bits …