Chaotic-map based encryption for 3D point and 3D mesh fog data in edge computing

KR Raghunandan, R Dodmane, K Bhavya… - IEEE …, 2022‏ - ieeexplore.ieee.org
Recent decades have seen dramatic development and adoption of digital technology. This
technological advancement generates a large amount of critical data that must be …

A novel cryptographic substitution box design using Gaussian distribution

MF Khan, A Ahmed, K Saleem - IEEE Access, 2019‏ - ieeexplore.ieee.org
In this paper, a novel method is being proposed to construct a substitution box or Boolean
function for block ciphers using Gaussian distribution and linear fractional transform. The …

Construction and optimization of dynamic s-boxes based on gaussian distribution

AR Alharbi, SS Jamal, MF Khan, MA Gondal… - IEEE …, 2023‏ - ieeexplore.ieee.org
Block ciphers are widely used for securing data and are known for their resistance to various
types of attacks. The strength of a block cipher against these attacks often depends on the S …

A secure chaos-based lightweight cryptosystem for the internet of things

WEH Youssef, A Abdelli, F Kharroubi, F Dridi… - IEEE …, 2023‏ - ieeexplore.ieee.org
This paper introduces a novel approach to addressing the security challenges of the Internet
of Things (IoT) by presenting a secure Chaos-based lightweight cryptosystem. The proposed …

Artificial neural network based chaotic generator for cryptology

I Dalkiran, K DANIŞMAN - Turkish Journal of Electrical …, 2010‏ - journals.tubitak.gov.tr
Chaotic systems are sensitive to initial conditions, system parameters and topological
transitivity and these properties are also remarkable for cryptanalysts. Noise like behavior of …

A novel design of cryptographic SP-network based on gold sequences and chaotic logistic tent system

MF Khan, A Ahmed, K Saleem, T Shah - IEEE Access, 2019‏ - ieeexplore.ieee.org
Substitution permutation network (SP-network) is a chain of linked mathematical primitives
used in block cipher algorithms. The proposed novel design of cryptographic SP-network …

Block cipher design: generalized single-use-algorithm based on chaos

G Zhao, G Chen, J Fang, G Xu - Tsinghua Science and …, 2011‏ - ieeexplore.ieee.org
The idea of using a one-time-one-key design has been widely applied in conventional
cryptography. With the security theory of conventional cryptology, encryption algorithms are …

A novel pseudo-random number generator: combining hyperchaotic system and DES algorithm for secure applications

A Hadj Brahim, H Ali Pacha, M Naim… - The Journal of …, 2025‏ - Springer
Generating random values become increasingly desirable due to its advantages. In this
paper, a novel pseudo-random number generator is proposed based on a hyperchaotic …

An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key

AA Zaher - Chaos, Solitons & Fractals, 2009‏ - Elsevier
In this paper, a secure communication technique, using a chaotic system with a single
adjustable parameter and a single observable time series, is proposed. The chosen chaotic …

Lorenz's attractor applied to the stream cipher (Ali-Pacha generator)

A Ali-Pacha, N Hadj-Said, A M'Hamed… - Chaos, Solitons & …, 2007‏ - Elsevier
The safety of information is primarily founded today on the calculation of algorithms whose
confidentiality depends on the number of the necessary bits for the definition of a …