Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
2D Sine Logistic modulation map for image encryption
Because of the excellent properties of unpredictability, ergodicity and sensitivity to their
parameters and initial values, chaotic maps are widely used in security applications. In this …
parameters and initial values, chaotic maps are widely used in security applications. In this …
Implementation and practical problems of chaos-based cryptography revisited
Chaos-based cryptography, since its inception, has become a widely published subject.
Despite the vast amount of contributions in the area, its applications in real-world scenarios …
Despite the vast amount of contributions in the area, its applications in real-world scenarios …
Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map
In the last two decades, the use of chaotic iterative maps in cryptographic systems,
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …
2D Logistic-Adjusted-Chebyshev map for visual color image encryption
L Liu, D Jiang, X Wang, X Rong, R Zhang - Journal of Information Security …, 2021 - Elsevier
With the increasing requirements of the performance in secure communication filed based
on chaos, chaotic systems have been gradually developed into higher dimensions. Because …
on chaos, chaotic systems have been gradually developed into higher dimensions. Because …
Constructing chaos-based hash function via parallel impulse perturbation
H Liu, X Wang, A Kadir - Soft Computing, 2021 - Springer
Secure hash functions, such as SHA-2 and SHA-3, play an important role in cryptography;
however, they are unkeyed and cannot produce the specific hash value with a specified …
however, they are unkeyed and cannot produce the specific hash value with a specified …
Design and analysis of new version of cryptographic hash function based on improved chaotic maps with induced DNA sequences
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main
aim of this paper is how to increase the security level of the blockchain based on the …
aim of this paper is how to increase the security level of the blockchain based on the …
A Nondegenerate n-Dimensional Hyperchaotic Map Model with Application in a Keyed Parallel Hash Function
M Zhao, H Liu - International Journal of Bifurcation and Chaos, 2023 - World Scientific
The construction of multidimensional discrete hyperchaotic maps with ergodicity and larger
Lyapunov exponents is desired in cryptography. Here, we have designed a general n D (n≥ …
Lyapunov exponents is desired in cryptography. Here, we have designed a general n D (n≥ …
A general hybrid model for chaos robust synchronization and degradation reduction
Y Deng, H Hu, N **ong, W **ong, L Liu - Information Sciences, 2015 - Elsevier
This paper focuses on the problem of robust synchronization of uncertain continuous chaos
and dynamical degradation of digital chaos. A hybrid model is established based on the …
and dynamical degradation of digital chaos. A hybrid model is established based on the …
Constructing a Nondegenerate 2D Integer-Domain Hyperchaotic Map Over GF() with Application in Parallel Hashing
Y Cao, H Liu, D Xu - International Journal of Bifurcation and Chaos, 2023 - World Scientific
To solve the problem of finite precision effect of existing chaotic maps on digital platform,
first, a nondegenerate 2D integer-domain hyperchaotic map (2D-IDHCM) over GF (2 n) is …
first, a nondegenerate 2D integer-domain hyperchaotic map (2D-IDHCM) over GF (2 n) is …
Image block encryption algorithm based on chaotic maps
L Liu, S Hao, J Lin, Z Wang, X Hu… - IET Signal Processing, 2018 - Wiley Online Library
Advanced in unpredictability, ergodicity and sensitivity to initial conditions and parameters,
chaotic maps are widely used in modern image encryption algorithms. In this study, the …
chaotic maps are widely used in modern image encryption algorithms. In this study, the …