Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Chaotic-map based encryption for 3D point and 3D mesh fog data in edge computing
Recent decades have seen dramatic development and adoption of digital technology. This
technological advancement generates a large amount of critical data that must be …
technological advancement generates a large amount of critical data that must be …
A novel cryptographic substitution box design using Gaussian distribution
In this paper, a novel method is being proposed to construct a substitution box or Boolean
function for block ciphers using Gaussian distribution and linear fractional transform. The …
function for block ciphers using Gaussian distribution and linear fractional transform. The …
Construction and optimization of dynamic s-boxes based on gaussian distribution
Block ciphers are widely used for securing data and are known for their resistance to various
types of attacks. The strength of a block cipher against these attacks often depends on the S …
types of attacks. The strength of a block cipher against these attacks often depends on the S …
A secure chaos-based lightweight cryptosystem for the internet of things
This paper introduces a novel approach to addressing the security challenges of the Internet
of Things (IoT) by presenting a secure Chaos-based lightweight cryptosystem. The proposed …
of Things (IoT) by presenting a secure Chaos-based lightweight cryptosystem. The proposed …
Artificial neural network based chaotic generator for cryptology
Chaotic systems are sensitive to initial conditions, system parameters and topological
transitivity and these properties are also remarkable for cryptanalysts. Noise like behavior of …
transitivity and these properties are also remarkable for cryptanalysts. Noise like behavior of …
A novel design of cryptographic SP-network based on gold sequences and chaotic logistic tent system
Substitution permutation network (SP-network) is a chain of linked mathematical primitives
used in block cipher algorithms. The proposed novel design of cryptographic SP-network …
used in block cipher algorithms. The proposed novel design of cryptographic SP-network …
Block cipher design: generalized single-use-algorithm based on chaos
The idea of using a one-time-one-key design has been widely applied in conventional
cryptography. With the security theory of conventional cryptology, encryption algorithms are …
cryptography. With the security theory of conventional cryptology, encryption algorithms are …
A novel pseudo-random number generator: combining hyperchaotic system and DES algorithm for secure applications
Generating random values become increasingly desirable due to its advantages. In this
paper, a novel pseudo-random number generator is proposed based on a hyperchaotic …
paper, a novel pseudo-random number generator is proposed based on a hyperchaotic …
An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key
In this paper, a secure communication technique, using a chaotic system with a single
adjustable parameter and a single observable time series, is proposed. The chosen chaotic …
adjustable parameter and a single observable time series, is proposed. The chosen chaotic …
Lorenz's attractor applied to the stream cipher (Ali-Pacha generator)
The safety of information is primarily founded today on the calculation of algorithms whose
confidentiality depends on the number of the necessary bits for the definition of a …
confidentiality depends on the number of the necessary bits for the definition of a …