Quantum walk and its application domains: A systematic review
K Kadian, S Garhwal, A Kumar - Computer Science Review, 2021 - Elsevier
Quantum random walk is the quantum counterpart of a classical random walk. The classical
random walk concept has long been used as a computational framework for designing …
random walk concept has long been used as a computational framework for designing …
Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion
L Teng, X Wang, Y **an - Information Sciences, 2022 - Elsevier
A two-dimensional cross-mode hyperchaotic map based on logistic and sine maps (2D-
CLSS) is presented. The hyperchaotic map consists of a logistic map and two sine maps …
CLSS) is presented. The hyperchaotic map consists of a logistic map and two sine maps …
Enhancement of the cast block algorithm based on novel S-box for image encryption
Background and Aim: due to the rapid growth of data communication and multimedia system
applications, security becomes a critical issue in the communication and storage of images …
applications, security becomes a critical issue in the communication and storage of images …
Quantum-inspired blockchain-based cybersecurity: securing smart edge utilities in IoT-based smart cities
Blockchain plays a vital task in cybersecurity. With the exerted efforts for realising large-
scale quantum computers, most current cryptographic mechanisms may be hacked …
scale quantum computers, most current cryptographic mechanisms may be hacked …
A 3-D multi-stable system with a peanut-shaped equilibrium curve: Circuit design, FPGA realization, and an application to image encryption
A new 3-D chaotic dynamical system with a peanut-shaped closed curve of equilibrium
points is introduced in this work. Since the new chaotic system has infinite number of rest …
points is introduced in this work. Since the new chaotic system has infinite number of rest …
Secure data encryption based on quantum walks for 5G Internet of Things scenario
AA Abd El-Latif, B Abd-El-Atty… - … on Network and …, 2020 - ieeexplore.ieee.org
Fifth generation (5G) networks are the base communication technology for connecting
objects in the Internet of Things (IoT) environment. 5G is being developed to provide …
objects in the Internet of Things (IoT) environment. 5G is being developed to provide …
Quantum Walk Computing: Theory, Implementation, and Application
X Qiang, S Ma, H Song - Intelligent Computing, 2024 - spj.science.org
The classical random walk formalism plays an important role in a wide range of applications.
Its quantum counterpart, the quantum walk, is proposed as an important theoretical model …
Its quantum counterpart, the quantum walk, is proposed as an important theoretical model …
Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption
We present a simple yet highly dimensional hybrid diode bridge circuit network that can
exhibit complex chaotic behaviours. Further, since our network is characterised by smooth …
exhibit complex chaotic behaviours. Further, since our network is characterised by smooth …
A color image encryption technique using block scrambling and chaos
KM Hosny, ST Kamal, MM Darwish - Multimedia Tools and Applications, 2022 - Springer
Images are very important forms of data that are widely used nowadays. Every day, millions
of grey and color images are transferred via the web. Protecting these images from …
of grey and color images are transferred via the web. Protecting these images from …
Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications
Designing efficient and secure cryptosystems has been a preoccupation for many scientists
and engineers for a long time wherein they use chaotic systems to design new …
and engineers for a long time wherein they use chaotic systems to design new …