A search for good pseudo-random number generators: Survey and empirical studies

K Bhattacharjee, S Das - Computer Science Review, 2022 - Elsevier
This paper targets to search so-called good generators by doing a brief survey over the
generators developed in the history of pseudo-random number generators (PRNGs), verify …

Color image encryption based on hybrid hyper-chaotic system and cellular automata

AY Niyat, MH Moattar, MN Torshiz - Optics and Lasers in Engineering, 2017 - Elsevier
This paper proposes an image encryption scheme based on Cellular Automata (CA). CA is a
self-organizing structure with a set of cells in which each cell is updated by certain rules that …

Image encryption algorithm based on a new 3D chaotic system using cellular automata

AY Darani, YK Yengejeh, H Pakmanesh… - Chaos, Solitons & …, 2024 - Elsevier
Cryptography and steganography are usual methods for safe transfer of information, which
encryption algorithms turn original images into unreadable noise-like images. This paper …

A novel hyperchaotic image encryption system based on particle swarm optimization algorithm and cellular automata

J Zeng, C Wang - Security and Communication Networks, 2021 - Wiley Online Library
In this paper, we propose a hyperchaotic image encryption system based on particle swarm
optimization algorithm (PSO) and cellular automata (CA). Firstly, to improve the ability to …

Investigation of strength and security of pseudo random number generators

K Sathya, J Premalatha… - IOP Conference Series …, 2021 - iopscience.iop.org
Security is a key factor in today's fast communicating world. Many cryptographic algorithms
are tested and put into use efficiently. Random numbers are used in diverse forms like …

Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol

AS Khader, D Lai - 2015 22nd international conference on …, 2015 - ieeexplore.ieee.org
The acceleration in developments in communication technology has led to a consequent
increase in the vulnerability of data due to penetration attacks. These attacks often came …

Optimal design of residential cogeneration systems under uncertainty

LF Fuentes-Cortés, JE Santibañez-Aguilar… - Computers & Chemical …, 2016 - Elsevier
This paper presents a multi-objective optimization method for designing cogeneration
systems in residential complexes and accounting for the involved uncertainty. The model …

Prevention of the man-in-the-middle attack on Diffie–Hellman key exchange algorithm: A review

S Mitra, S Das, M Kule - … of international conference on frontiers in …, 2021 - Springer
In this report, we demonstrate the pros and cons of Diffie–Hellman key exchange algorithm
that is commonly used for the exchange of keys in private-key cryptosystem. A very …

A derivative matrix-based covert communication method in blockchain

X Zhang, X Zhang, X Zhang, W Sun… - … Systems Science and …, 2023 - dr.ntu.edu.sg
The data in the blockchain cannot be tampered with and the users are anonymous, which
enables the blockchain to be a natural carrier for covert communication. However, the …

Cellular automata: Reversibility, semi-reversibility and randomness

K Bhattacharjee - arxiv preprint arxiv:1911.03609, 2019 - arxiv.org
In this dissertation, we study two of the global properties of 1-dimensional cellular automata
(CAs) under periodic boundary condition, namely, reversibility and randomness. To address …